$ man cve-lookup
/cve-lookup(1)
PRICE / CALL
$0.005
USDC · base mainnet · scheme: exact
METHOD
POST
CLUSTER
prooflayerCATEGORY
ai
STATUS
● live
NAME
cve-lookup — cve lookup / vulnerability database
SYNOPSIS
POST https://x402.org/v1/cve-lookup
Content-Type: application/json
X-PAYMENT: <signed-transferWithAuthorization>
{ ... }↳ first call →
402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.DESCRIPTION
CVE lookup / vulnerability database. NIST NVD-backed. CVSS v3.1 + v2 scores, severity, affected CPEs, CWE class, references, public-exploit indicators. Plus LLM exploitability summary.
INPUT — request schema
| property | type | description | req? |
|---|---|---|---|
| cve_id | string | e.g. 'CVE-2021-44228'. | required |
OUTPUT — response shape
| field | type | description |
|---|---|---|
| cve_id | string | CVE identifier in standard CVE-YYYY-NNNNN format. |
| description | string | Official NVD summary of the vulnerability and its impact. |
| published | string | ISO 8601 timestamp of when the CVE was first published to NVD. |
| cvss_v3_1 | object | Full CVSS v3.1 metrics object with base score, vector string, and impact/exploitability subscores. |
| cvss_v2 | object | Full CVSS v2 metrics object with base score, vector, and access/impact subscores when available. |
| score | number | Primary numeric CVSS score (v3.1 base score preferred, falls back to v2) on a 0-10 scale. |
| severity | string | Severity label derived from the CVSS score: NONE, LOW, MEDIUM, HIGH, or CRITICAL. |
| cwe | array | Array of associated CWE identifiers classifying the weakness type (e.g. CWE-79, CWE-89). |
| affected_cpes | array | Array of CPE 2.3 URIs identifying vendor, product, and version ranges affected by the CVE. |
| exploit_summary | string | LLM-generated plain-English summary of how the vulnerability is exploited and its practical impact. |
| public_exploit_known | boolean | True if a public proof-of-concept or weaponized exploit exists for this CVE. |
| exploit_references | array | Array of URLs pointing to public exploit code, PoCs, or exploit-DB entries for the CVE. |
| references | array | Array of NVD reference URLs: vendor advisories, patches, mailing-list posts, and analysis writeups. |
EXAMPLES — two ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/cve-lookup \
-H 'Content-Type: application/json' \
-d '{ }'first response =
402 Payment Required with payment requirements; sign + retry with X-PAYMENT.EXAMPLE 2 · mcp
# install once claude mcp add x402 --command "npx x402-deployer-mcp" # then ask Claude Code: # "use the cve-lookup tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
- tags
- cvevulnerabilitysecuritynvdexploit
- env
- VENICE_API_KEY
- methods
- POST
- cluster
- prooflayer
- price
- $0.005 USDC per call
ADJACENT — other endpoints in prooflayer
| endpoint | description | price |
|---|---|---|
| cve | CVE lookup / vulnerability database. | $0.005 |
| pypi-package-risk | PyPI package risk score / Python supply-chain scanner. | $0.01 |
| db-migration-risk | DB migration risk audit / SQL migration safety check / DROP COLUMN detector / unsafe ALTER TABLE detector / Postgres CREATE INDEX CONCURR… | $0.02 |
| deploy-config-risk | deploy config audit / Dockerfile lint / vercel.json hardening / wrangler.toml review / docker-compose.yml safety / fly.toml secrets check… | $0.02 |
| secrets-exposure-check | secrets exposure scan / hardcoded API key detector / .env-committed-key audit / Next.js client env leak detector / pre-deploy secret gate. | $0.02 |
| ai-content-detector | AI content detector / GPT detector / ChatGPT plagiarism checker. | $0.03 |
| dep-risk-summary | repo dependency risk audit / package.json + lockfile vetter / unpinned dep detector / transitive dep counter / requirements.txt audit / p… | $0.03 |
| github-repo-health | GitHub repo health score / open-source maintainability checker. | $0.03 |
SEE ALSO