This skill lets the agent query the National Vulnerability Database (NVD) to find CVE records by identifier or by keyword/version. It returns structured CVE details — CVSS v3/v2 scores, severity, vector strings, CWE identifiers, exploitability/impact metrics, references (vendor advisories, patches, exploits), and affected CPE configurations — enabling rapid vulnerability lookups, triage, and reporting. The skill provides two primary operations: get_cve for exact CVE lookups and search_cve for broader keyword or version searches.
Use this skill during security audits, post-scan enrichment, incident response when a CVE ID is cited, upgrade planning to compare exposures across versions, or fleet-wide vulnerability sweeps. It is valuable when you have a software/version string from show version or inventory data and want to map known CVEs to deployed devices.
get_cve and search_cve through the MCP call wrapper (no separate scripts/dir present in this repo snapshot).Best used with agents that can run shell/python MCP calls (OpenClaw/agentic environments) and have network/API access to NVD and any required API keys.
Cette compétence n'a pas encore été examinée par notre pipeline d'audit automatisé.