Skip to content
clusters: prooflayer · edgemarket · edgefinance · synthforge · mediakit · wordmint · webprobe · locale · comppoint
$ man cve

/cve(1)

PRICE / CALL
$0.005
USDC · base mainnet · scheme: exact
METHOD
POST
CLUSTER
prooflayer
CATEGORY
ai
STATUS
live
NAME
cve cve lookup / vulnerability database
SYNOPSIS
POST https://x402.org/v1/cve
     Content-Type: application/json
     X-PAYMENT:    <signed-transferWithAuthorization>

     { ... }
↳ first call → 402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.
DESCRIPTION

CVE lookup / vulnerability database. NIST NVD-backed. CVSS v3.1+v2 scores, severity, affected CPEs, CWE, exploit indicators + LLM summary.

INPUTrequest schema
propertytypedescriptionreq?
cve_idstringe.g. 'CVE-2021-44228'.required
OUTPUTresponse shape
fieldtypedescription
cve_idstringCVE identifier in the form CVE-YYYY-NNNNN (e.g., CVE-2024-3094).
descriptionstringNVD's plain-text summary of the vulnerability and its impact.
publishedstringISO 8601 timestamp when NVD first published the CVE record.
cvss_v3_1objectCVSS v3.1 metrics object with base score, vector string, and severity breakdown.
cvss_v2objectLegacy CVSS v2 metrics object with base score, vector, and access/impact subscores.
scorenumberPrimary numeric CVSS base score (v3.1 preferred, falls back to v2) on the 0.0–10.0 scale.
severitystringQualitative severity label: NONE, LOW, MEDIUM, HIGH, or CRITICAL.
cwearrayArray of associated CWE weakness identifiers (e.g., CWE-79, CWE-787).
affected_cpesarrayArray of CPE 2.3 URIs identifying vulnerable products, versions, and configurations.
exploit_summarystringLLM-generated plain-English summary of how the vulnerability is exploited and its blast radius.
public_exploit_knownbooleanTrue if public exploit code, PoC, or active exploitation evidence is referenced.
exploit_referencesarrayArray of URLs to public PoCs, Metasploit modules, or exploit-DB entries.
referencesarrayArray of NVD reference URLs (vendor advisories, patches, analysis writeups).
EXAMPLEStwo ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/cve \
  -H 'Content-Type: application/json' \
  -d '{ }'
first response = 402 Payment Required with payment requirements; sign + retry with X-PAYMENT.
EXAMPLE 2 · mcp
# install once
claude mcp add x402 --command "npx x402-deployer-mcp"

# then ask Claude Code:
# "use the cve tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
tags
cvevulnerabilitysecuritynvdexploit
env
VENICE_API_KEY
methods
POST
cluster
prooflayer
price
$0.005 USDC per call
ADJACENTother endpoints in prooflayer
endpointdescriptionprice
cve-lookupCVE lookup / vulnerability database.$0.005
pypi-package-riskPyPI package risk score / Python supply-chain scanner.$0.01
db-migration-riskDB migration risk audit / SQL migration safety check / DROP COLUMN detector / unsafe ALTER TABLE detector / Postgres CREATE INDEX CONCURR…$0.02
deploy-config-riskdeploy config audit / Dockerfile lint / vercel.json hardening / wrangler.toml review / docker-compose.yml safety / fly.toml secrets check…$0.02
secrets-exposure-checksecrets exposure scan / hardcoded API key detector / .env-committed-key audit / Next.js client env leak detector / pre-deploy secret gate.$0.02
ai-content-detectorAI content detector / GPT detector / ChatGPT plagiarism checker.$0.03
dep-risk-summaryrepo dependency risk audit / package.json + lockfile vetter / unpinned dep detector / transitive dep counter / requirements.txt audit / p…$0.03
github-repo-healthGitHub repo health score / open-source maintainability checker.$0.03
SEE ALSO
agentutility(7) · prooflayer(7) · x402(7) · mcp(7) · llms.txt · registry.json · bazaar.x402.org