
Nightvision-MCP
3 years
Works with Finder
1
Github Watches
0
Github Forks
1
Github Stars
NightVision MCP Server
A Model Context Protocol (MCP) server that enables AI assistants to interact with the NightVision security platform, providing comprehensive capabilities for security testing, scanning, template management, and vulnerability analysis.
Features
- List NightVision targets with filtering options
- Get detailed information about specific targets
- Create new targets with customizable options
- Delete targets when they are no longer needed
- Start security scans against targets
- Track scan status and view results
- View and filter vulnerabilities found in security scans
- Discover API endpoints for API targets
- Upload custom nuclei templates for targeted vulnerability scanning
- Integration with Claude and other MCP-compatible assistants
Prerequisites
- Node.js 16+
- NightVision CLI installed and configured
- Valid NightVision account and authentication
Installation
-
Clone this repository:
git clone https://github.com/NimblerSecurity/nightvision-mcp.git cd nightvision-mcp
-
Install dependencies:
npm install
-
Build the TypeScript code:
npm run build
Using with Claude for Desktop
-
Edit your Claude for Desktop configuration file:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json
- Windows:
%APPDATA%\Claude\claude_desktop_config.json
- macOS:
-
Add this MCP server configuration:
{ "mcpServers": { "nightvision": { "command": "node", "args": ["/absolute/path/to/build/index.js"] } } }
-
Restart Claude for Desktop.
Using with Cursor
-
Configure the MCP server integration by adding it to one of the following locations:
-
Project Configuration (recommended for project-specific use):
Create a.cursor/mcp.json
file in your project directory with the following content:{ "mcpServers": { "nightvision": { "command": "node", "args": ["/absolute/path/to/build/index.js"] } } }
-
Global Configuration (for use across all projects):
Create a~/.cursor/mcp.json
file in your home directory with the same content as above.
-
-
Restart Cursor or reload the window
-
The NightVision tools will now be available to Cursor's AI assistant.
Usage
Authentication
The NightVision MCP Server requires authentication to interact with the NightVision API. You have three options for authentication:
- Use an existing token - If you already have a NightVision API token, you can provide it to the server.
- Create a new token - The server can create a new token for you using the NightVision CLI.
- Use the token saved from a previous session - Tokens are stored locally for convenience.
Using the Authentication Tool
The server provides an authenticate
tool that can be used from any MCP client (Claude Desktop, Cursor, etc.):
Can you create a new NightVision authentication token?
To check current authentication status:
Can you check if I'm authenticated with NightVision?
Token Storage
Authentication tokens are stored in ~/.nightvision/token
on your machine. This allows the server to remain authenticated between restarts.
Available Tools
The server provides the following tools:
authenticate
Manages authentication with the NightVision API.
Parameters:
-
token
(string, optional): NightVision API token to use for authentication -
create_new
(boolean, optional): Create a new token instead of using an existing one -
expiry_date
(string, optional): Expiry date for new token in format YYYY-MM-DD
Example commands in Claude or Cursor:
Can you create a new NightVision authentication token?
Can you authenticate with NightVision using token "my-token-value"?
list-targets
Lists all NightVision targets with optional filtering.
Parameters:
-
all
(boolean, optional): Specify to get targets against all projects -
projects
(string[], optional): Project names to filter the target list -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example command in Claude:
Can you list all my NightVision targets? If there are too many, just show those in my current project.
get-target-details
Gets detailed information about a specific target.
Parameters:
-
name
(string): Name of the target to get details for -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example command in Claude:
Can you show me details about my NightVision target called "testphp"?
create-target
Creates a new NightVision target for scanning.
Parameters:
-
name
(string): Name of the target to create -
url
(string): URL of the target -
project
(string, required): Project Name of the target -
project_id
(string, optional): Project UUID of the target -
type
(enum: "API" | "WEB", optional, default: "WEB"): Type of the target -
spec_file
(string, optional): Path to a swagger specification / Postman collection file (for API targets) -
spec_url
(string, optional): URL to a swagger specification / Postman collection (for API targets) -
exclude_url
(string[], optional): URL regex patterns to exclude -
exclude_xpath
(string[], optional): XPath expressions to exclude -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you create a new NightVision target called "my-test-app" for the URL "https://example.com/app" in the "Web Security" project?
Can you create a new API target in NightVision with the name "petstore-api" for "https://petstore.swagger.io/v2" in the "API Testing" project using the swagger URL "https://petstore.swagger.io/v2/swagger.json"?
delete-target
Deletes a NightVision target.
Parameters:
-
name
(string): Name of the target to delete
Example commands:
Can you delete my NightVision target called "my-test-app"?
Can you delete the target named "petstore-api" from project "security-testing"?
start-scan
Initiates a security scan against a NightVision target. The scan runs asynchronously in the background.
Parameters:
-
target_name
(string): Name of the target to scan -
auth
(string, optional): Authentication name to use for the scan -
auth_id
(string, optional): Authentication UUID to use for the scan -
no_auth
(boolean, optional): Specify to run the scan without authentication -
project
(string, optional): Project name of the target -
project_id
(string, optional): Project UUID of the target -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you start a scan on my NightVision target called "my-test-app"?
Can you run a NightVision scan against the "petstore-api" target using the "api-key" authentication?
list-scans
Lists all scans with optional filtering by target, project, or status.
Parameters:
-
target
(string, optional): Filter scans by target name -
project
(string, optional): Filter scans by project name -
project_id
(string, optional): Filter scans by project UUID -
limit
(number, optional): Maximum number of scans to return -
status
(enum: "running" | "finished" | "failed" | "all", optional, default: "all"): Filter scans by status -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you list all my recent NightVision scans?
Can you show me all running scans for the "my-project" project?
get-scan-status
Retrieves the status and details of a specific scan.
Parameters:
-
scan_id
(string, optional): ID of the scan to get status for -
target_name
(string, optional): Name of the target to get the latest scan status for -
project
(string, optional): Project name to filter by when using target_name -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Note: Either scan_id
or target_name
must be provided.
Example commands:
Can you check the status of my NightVision scan with ID "12345678-1234-1234-1234-123456789012"?
What's the current progress of the scan I just started on target "my-webapp"?
get-scan-checks
Retrieves vulnerabilities and check results found by a specific scan. This tool allows you to see detailed information about security findings and filter results by severity, status, and other criteria.
Parameters:
-
scan_id
(string): ID of the scan to get vulnerability checks for -
page
(number, optional): Page number for pagination -
page_size
(number, optional, default: 100): Number of items per page (defaults to 100) -
check_kind
(string, optional): Filter vulnerability checks by specific kind -
severity
(string[], required): Array of severity levels to filter by. Valid values include: "critical", "high", "medium", "low", "info", "unknown", "unspecified" -
status
(number[], required): Array of status codes to filter by. Valid values include: 0 (open), 1 (closed), 2 (false positive), 3 (accepted risk) -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you show me all vulnerabilities found in my scan with ID "12345678-1234-1234-1234-123456789012"?
What high severity issues were found in my most recent scan? Use scan ID "87654321-4321-4321-4321-210987654321".
Could you list only the open SQL injection vulnerabilities from my scan with ID "12345678-1234-1234-1234-123456789012"?
Example usage:
{
"scan_id": "12345678-1234-1234-1234-123456789012",
"severity": ["high", "critical"],
"status": [0, 1],
"page_size": 100,
"format": "table"
}
get-scan-paths
Retrieves all paths (URLs) that have been checked during a specific scan. This helps you understand what endpoints were tested and their status.
Parameters:
-
scan_id
(string): ID of the scan to get checked paths for -
page
(number, optional): Page number for pagination -
page_size
(number, optional): Number of items per page -
filter
(string, optional): Filter string to narrow down the paths -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you show me all paths that were checked in my scan with ID "12345678-1234-1234-1234-123456789012"?
What URLs were tested in my last scan? The scan ID is "87654321-4321-4321-4321-210987654321".
Show me page 2 of the paths checked in my scan with ID "12345678-1234-1234-1234-123456789012" with 20 items per page.
Can you filter the tested paths containing "/api/" in my scan with ID "12345678-1234-1234-1234-123456789012"?
Example usage:
{
"scan_id": "12345678-1234-1234-1234-123456789012",
"page": 1,
"page_size": 50,
"filter": "/api/",
"format": "table"
}
API Tools
discover-api
Discovers API endpoints by analyzing source code using the NightVision CLI's swagger extract
feature. This tool extracts API information from the codebase and generates a Swagger/OpenAPI specification file.
This tool now prompts for your project path before analyzing the code.
When you run this tool, it will:
- First ask you to confirm your absolute project directory path
- After you provide the path, it will analyze your code using that path for resolving relative paths
Parameters:
-
source_paths
(string[]): Paths to code directories to analyze (both absolute and relative paths are supported) -
lang
(enum: "csharp" | "go" | "java" | "js" | "python" | "ruby"): Language of the target code -
target
(string, optional): Target name to upload the swagger file to -
target_id
(string, optional): Target UUID to upload the swagger file to -
project
(string, optional): Project name for the swagger extract -
project_id
(string, optional): Project UUID for the swagger extract -
output
(string, required): Output file path to store the OpenAPI specs -
exclude
(string, optional): Files or directories to exclude from analysis (comma-separated, e.g. 'vendor/,.json') -
version
(string, optional, default: "0.1"): Version for the OpenAPI specs -
no_upload
(boolean, optional, default: true): Skip creation of a new target in the Nightvision API -
dump_code
(boolean, optional): Include code snippets in the generated spec -
verbose
(boolean, optional, default: false): Enable verbose output for detailed debugging information -
format
(enum: "text" | "json" | "table", optional, default: "text"): Format of command output
Example commands:
Can you discover API endpoints in my JavaScript codebase by analyzing the "./src/routes" directory and save the result to "api-spec.yml"?
Please analyze my Java application in the "./src/controllers" directory to generate an API specification at "./output/openapi.json" and link it to my "my-api" target.
Example usage:
{
"source_paths": ["./src/routes", "./src/controllers"],
"lang": "js",
"output": "./api-spec.yml",
"target": "my-api-target",
"project": "my-project",
"exclude": "node_modules/*,*.test.js",
"dump_code": true
}
Path Resolution in API Discovery:
The discover-api
tool now interactively asks for your project path to ensure accurate path resolution.
When you invoke the tool, it will prompt you for the absolute path to your project directory. This ensures that:
- Relative paths are resolved correctly even if the MCP server has a different working directory
- All file operations use the correct base directory
- You don't have to worry about where the server is running from
After providing your project path, the tool supports both relative and absolute paths for both source code and output files:
-
Relative paths (like
./src/routes
or./output/api-spec.yml
):- These are automatically resolved relative to your provided project path
- For example,
./src/routes
will resolve to/your/provided/project/path/src/routes
- Especially useful for analyzing the current project and storing outputs in the project directory
-
Absolute paths (starting with
/
):- These are used exactly as provided
- Example:
/home/user/project/src/routes
The required output
parameter works the same way:
- Relative paths:
"output": "./api/openapi.yml"
will save in your specified project directory - Absolute paths:
"output": "/tmp/openapi.yml"
will save to the absolute location
In both cases, the tool will:
- Automatically resolve paths to absolute paths
- Show the path resolution in the output
- Write the OpenAPI spec to the specified location if writable
Note: The server will automatically handle permissions issues and redirect output to writable locations when needed.
Project Tools
list-projects
Lists all NightVision projects accessible to your account. This tool helps you see all available projects and their basic information.
Parameters:
-
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you list all my NightVision projects?
Show me all the projects I have access to in NightVision as a table.
Example usage:
{
"format": "table"
}
get-project-details
Gets detailed information about a specific NightVision project.
Parameters:
-
name
(string): Name of the project to get details for (required) -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you show me details about my NightVision project called "Web Security"?
Get information about the "API Testing" project in NightVision.
Example usage:
{
"name": "Web Security",
"format": "json"
}
Nuclei Tools
list-nuclei-templates
Lists all available nuclei templates in NightVision. This tool helps you see what templates are available for use with your targets.
Parameters:
-
project_id
(string, optional): UUID of the project to filter templates by -
filter
(string, optional): Filter string to narrow down templates by name -
page
(number, optional): Page number for pagination -
page_size
(number, optional, default: 100): Number of items per page (defaults to 100) -
severity
(string[], optional): Array of severity levels to filter by. Valid values include: "critical", "high", "medium", "low", "info", "unknown", "unspecified" -
target
(string, optional): UUID of the target to filter templates by -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you list all my custom nuclei templates?
Show me all nuclei templates in project with ID "2b0636ed-39ce-4348-8836-286b2129bfe0"
List all high and critical severity nuclei templates for my target
Example usage:
{
"project_id": "2b0636ed-39ce-4348-8836-286b2129bfe0",
"filter": "sql",
"page": 1,
"page_size": 100,
"severity": ["high", "critical"],
"target": "87654321-4321-4321-4321-210987654321",
"format": "table"
}
create-nuclei-template
Creates a new nuclei template record in NightVision. This step is required before uploading a nuclei template file, as it generates the UUID needed for the upload process.
Parameters:
-
name
(string): Name of the nuclei template (required) -
description
(string, optional): Description of the nuclei template -
project_id
(string): UUID of the project to associate the template with (required) -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you create a new nuclei template called "Custom SQL Injection" with description "Detects SQL injection in web forms" with project ID "2b0636ed-39ce-4348-8836-286b2129bfe0"?
Please create a nuclei template with name "JWT Token Scanner" for project ID "87654321-4321-4321-4321-210987654321".
Example usage:
{
"name": "Custom SQL Injection",
"description": "Detects SQL injection in web forms",
"project_id": "2b0636ed-39ce-4348-8836-286b2129bfe0",
"format": "json"
}
upload-nuclei-template
Uploads a custom nuclei template YAML file to an existing template record in NightVision. Important: You must first create a template using the create-nuclei-template
tool to get a template ID.
Parameters:
-
template_id
(string): ID of the nuclei template to upload to (the template must exist in NightVision) -
file_path
(string): Path to the YAML file containing the nuclei template (absolute or relative path) -
project_path
(string, optional): Absolute path to the project directory (for resolving relative file paths) -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you upload my custom nuclei template from "./templates/sql-injection.yaml" to template ID "12345678-1234-1234-1234-123456789012"?
Please upload the nuclei template at "/path/to/my/template.yaml" to my NightVision template with ID "87654321-4321-4321-4321-210987654321".
Example usage:
{
"template_id": "12345678-1234-1234-1234-123456789012",
"file_path": "./templates/sql-injection.yaml",
"project_path": "/Users/myname/projects/security-templates",
"format": "json"
}
assign-nuclei-template
Assigns a nuclei template to a target in NightVision. This is a crucial step after creating and uploading a template, as it allows the template to be used in scans against the specified target.
Parameters:
-
target_id
(string): ID of the target to assign the template to (required) -
template_id
(string): ID of the nuclei template to assign (required) -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you assign my nuclei template with ID "12345678-1234-1234-1234-123456789012" to target with ID "87654321-4321-4321-4321-210987654321"?
Please link my custom template "12345678-1234-1234-1234-123456789012" to my target "87654321-4321-4321-4321-210987654321".
Example usage:
{
"target_id": "87654321-4321-4321-4321-210987654321",
"template_id": "12345678-1234-1234-1234-123456789012",
"format": "json"
}
Complete Workflow for Nuclei Templates:
-
First, create a nuclei template record to get its UUID:
Can you create a new nuclei template called "Custom SQL Injection" with description "Detects SQL injection in web forms" with project ID "2b0636ed-39ce-4348-8836-286b2129bfe0"?
-
Then, upload your YAML template file using the returned UUID:
Now, please upload my template file from "./templates/custom-sqli.yaml" to the template ID you just created.
-
Finally, assign the template to a target:
Now, assign this template to my target with ID "87654321-4321-4321-4321-210987654321".
Path Resolution in Nuclei Template Upload:
Similar to the API discovery tool, the upload-nuclei-template
tool supports both relative and absolute paths:
-
Relative paths (like
./templates/sql-injection.yaml
):- If a
project_path
parameter is provided, the relative path will be resolved against it - If no
project_path
is provided, the path will be resolved relative to the current working directory
- If a
-
Absolute paths (starting with
/
):- These are used exactly as provided
- Example:
/home/user/templates/sql-injection.yaml
For better accuracy when using relative paths, it's recommended to include the project_path
parameter with the absolute path to your project directory.
Traffic Tools
record-traffic
Records browser traffic for a target using browser automation. This tool opens a browser window where you can interact with the application, then uploads the recorded traffic as a HAR file to NightVision.
Parameters:
-
name
(string): Name for the traffic recording (required) -
url
(string): URL to record traffic from (required) -
target
(string): Name of the target (required) -
project
(string): Name of the project (required) -
format
(enum: "text" | "json" | "table", optional, default: "text"): Format of command output
Example commands:
Can you record my traffic on "https://javaspringvulny.nvtest.io:9000/" for my "javaspringvulny" target in project "ceylan" and name it "login-flow"?
Record browser traffic for my target application at "https://vulnerable-webapp.com" and save it as "admin-authentication"
Example usage:
{
"name": "login-flow",
"url": "https://javaspringvulny.nvtest.io:9000/",
"target": "javaspringvulny",
"project": "ceylan",
"format": "text"
}
When you run this tool:
- A browser window will open automatically at the specified URL
- You'll interact with the application to generate traffic (login, navigate, use features, etc.)
- When finished, you'll close the browser window
- The traffic will be automatically recorded as a HAR file and uploaded to NightVision
list-traffic
Lists all available traffic recordings (HAR files) for a specific target.
Parameters:
-
target
(string): Name of the target (required) -
project
(string): Name of the project (required) -
format
(enum: "text" | "json" | "table", optional, default: "json"): Format of command output
Example commands:
Can you list all the traffic files for my "javaspringvulny" target in project "ceylan"?
Show me all the recorded HAR files for the "billing-app" target
Example usage:
{
"target": "javaspringvulny",
"project": "ceylan",
"format": "table"
}
download-traffic
Downloads a specific traffic recording (HAR file) for analysis.
This tool will use the provided downloadPath or interactively ask for a writable directory path before downloading the file.
When you run this tool, it will:
- Use the
downloadPath
parameter if provided in the initial request, or ask you to provide one - Validate that the directory is absolute and writable
- Download the HAR file to the specified directory
- Resolve any relative output_file paths against the download directory
Parameters:
-
name
(string): Name of the traffic file to download (required) -
target
(string): Name of the target (required) -
project
(string): Name of the project (required) -
downloadPath
(string, optional): Absolute directory path where the file should be downloaded (must be writable) -
output_file
(string, optional): Path where to save the downloaded HAR file (if not specified, saves as ".har") -
format
(enum: "text" | "json" | "table", optional, default: "text"): Format of command output
Example commands:
Can you download the traffic file named "login-flow" for my "javaspringvulny" target in project "ceylan"?
Get the "admin-authentication" HAR file and save it to "/tmp/admin-auth.har"
Example usage:
{
"name": "login-flow",
"target": "javaspringvulny",
"project": "ceylan",
"downloadPath": "/Users/username/Downloads",
"output_file": "login-flow.har",
"format": "text"
}
Path Resolution in Traffic File Download:
The download-traffic tool handles paths in the following ways:
-
downloadPath: Must be an absolute directory path that exists and is writable
- If the path is not absolute, the home directory will be used
- If the path is not writable, the system temp directory will be used
-
output_file:
-
Relative paths (like
analysis/login-flow.har
):- These are automatically resolved relative to the
downloadPath
- For example, with
downloadPath: "/Users/username/Downloads"
andoutput_file: "analysis/login-flow.har"
, the file will be saved to/Users/username/Downloads/analysis/login-flow.har
- These are automatically resolved relative to the
-
Absolute paths (starting with
/
):- These are used exactly as provided
- Example:
/tmp/traffic.har
-
-
When no output_file is specified:
- The file will be saved with the original name in the
downloadPath
directory - Example:
{name}.har
- The file will be saved with the original name in the
Complete Workflow for Traffic Recording and Analysis:
-
First, record traffic using your browser:
Can you record my traffic on "https://javaspringvulny.nvtest.io:9000/" for my "javaspringvulny" target in project "ceylan" and name it "login-flow"?
-
Then, list available recordings to confirm it was saved:
List all traffic files for "javaspringvulny" in project "ceylan"
-
Finally, download a recording for analysis:
Download the "login-flow" traffic file for target "javaspringvulny" in project "ceylan" to "/Users/username/Downloads"
Development
To run the server in development mode (build and start):
npm run dev
Limitations
- This is an MVP implementation that focuses on target management and basic scanning functionality
- Authentication is managed through the NightVision CLI, not the MCP server
- Error handling is basic and may not cover all edge cases
Security Considerations
This server runs NightVision CLI commands with the permissions of the current user. Be cautious when exposing this functionality to models, as it could potentially execute arbitrary commands if not properly restricted.
Troubleshooting
Common Installation Issues
"spawn node ENOENT" Error
If you see an error like A system error occurred (spawn node ENOENT)
when Claude or Cursor tries to launch the MCP server, it means the node
command can't be found in the system's PATH. This can happen even if Node.js is installed on your system.
To fix this:
-
Use absolute path to Node.js: Modify your MCP configuration to use the full path to the Node.js executable. First, find your Node.js installation path:
which node
Then update your configuration (in Claude for Desktop configuration or Cursor's MCP config):
{ "mcpServers": { "nightvision": { "command": "/usr/local/bin/node", // Replace with your actual node path "args": ["/Users/yourusername/path/to/nightvision-mcp/build/index.js"] } } }
-
Fix your PATH in the configuration file: You can add PATH settings in your shell profile files (
.zshrc
,.bash_profile
, etc.) to ensure Node.js is accessible.
Module Not Found Errors
If you see errors related to missing modules:
- Make sure you've run
npm install
in the project directory - Check if you're using the correct Node.js version (16+)
- Try rebuilding the project with
npm run build
Authentication Issues
If you see authentication errors:
- Run
nightvision login --api-url https://api.nightvision.net
in your terminal to authenticate with the CLI - Check if your token is valid and not expired (tokens are stored in
~/.nightvision/token
)
Connection Issues
If Claude or Cursor can't connect to the MCP server:
- Make sure the server is running (either as a background process or in a separate terminal)
- Check that the path to
build/index.js
in your configuration is correct - Verify there are no firewall or security settings blocking the connection
Claude Authentication Issues
If you see errors related to Claude authentication such as:
- "Error refreshing default models: ConnectError: [unauthenticated] Error"
- "Authentication error" or other Claude-specific connection errors
Try the following:
-
Check your Claude API key/session:
- For Claude for Desktop: Sign out and sign back in
- For Cursor: Make sure your Anthropic API key is correctly set up
-
Restart the application:
- Completely close and reopen Claude for Desktop or Cursor
- If using a browser-based interface, clear browser cache and reload
-
Check your internet connection:
- Ensure you have a stable internet connection
- If on a VPN, try disabling it temporarily
- Check if your corporate network is blocking outbound connections to Anthropic's services
-
Check service status:
- Check if Anthropic's services are experiencing any outages
Note that these authentication errors are specific to the Claude service and are separate from NightVision MCP server authentication.
Cursor-Specific Troubleshooting
Fixing "spawn node ENOENT" in Cursor
If you're using Cursor and seeing the A system error occurred (spawn node ENOENT)
error, follow these specific steps:
-
Identify your node path:
which node
-
Edit your MCP configuration: Create or edit the file
~/.cursor/mcp.json
(or.cursor/mcp.json
in your project directory):{ "mcpServers": { "nightvision": { "command": "/usr/local/bin/node", // Replace with the output from 'which node' "args": ["/absolute/path/to/nightvision-mcp/build/index.js"] } } }
-
Alternative approach using shell wrapper: If the above doesn't work, create a shell script wrapper:
Create a file named
start-nightvision-mcp.sh
:#!/bin/bash export PATH="/usr/local/bin:$PATH" # Ensure node is in the PATH node /absolute/path/to/nightvision-mcp/build/index.js
Make it executable:
chmod +x start-nightvision-mcp.sh
Update your MCP configuration to use this script:
{ "mcpServers": { "nightvision": { "command": "/absolute/path/to/start-nightvision-mcp.sh", "args": [] } } }
-
Verify Node.js installation: If you're still having issues, ensure Node.js is correctly installed:
node --version
If the command fails, you may need to reinstall Node.js.
License
MIT
相关推荐
😎简单易用、🧩丰富生态 -大模型原生即时通信机器人平台| 适配QQ / 微信(企业微信、个人微信) /飞书 /钉钉 / discord / telegram / slack等平台| 支持chatgpt,deepseek,dify,claude,基于LLM的即时消息机器人平台,支持Discord,Telegram,微信,Lark,Dingtalk,QQ,Slack
Reviews

user_YHFI0mp6
As a dedicated user of the nightvision-mcp by nvsecurity, I must say that this product has significantly enhanced my home security system. The night vision capabilities are impressive, providing clear images even in complete darkness. It's user-friendly and easy to integrate with existing systems. Highly recommend for anyone in need of reliable night-time surveillance!

user_gCGEXBtf
The nightvision-mcp by nvsecurity is an exceptional tool for any security enthusiast. Its advanced features and user-friendly interface make it an indispensable asset for night surveillance. I’ve found the detailed welcome information extremely helpful in getting started quickly. Highly recommend for anyone needing reliable night vision capabilities!

user_vCDX1NQk
Nightvision-mcp by nvsecurity is a fantastic tool for anyone needing enhanced night-time security. The seamless integration and user-friendly interface make monitoring in low-light conditions a breeze. Its reliable performance ensures you’ll never miss a crucial moment. Highly recommended for personal and professional use!

user_Z7V71yxr
As a loyal user of nightvision-mcp by nvsecurity, I must say this application is a game-changer for night surveillance. The clarity and detail it provides in low-light conditions are unmatched. Highly recommended for anyone needing reliable night vision capabilities!

user_wqm4E52g
I've been using nightvision-mcp for a few weeks now, and it's been a game-changer for my security needs. The tool is intuitive and easy to navigate, offering a range of features that enhance my night surveillance capabilities. The support from nvsecurity is stellar, and the product's performance has surpassed my expectations. Highly recommended for anyone looking to upgrade their security setup.

user_y38ZGimh
As an avid user of the nightvision-mcp by nvsecurity, I am thoroughly impressed with its performance. The night vision capabilities are top-notch, providing clear and detailed images even in complete darkness. The user interface is intuitive and easy to navigate, making it accessible for users of all levels. Overall, a highly reliable and efficient product for anyone in need of enhanced security measures.

user_nhfoUp4o
I've been using the nightvision-mcp from nvsecurity for a while now and it's fantastic. It significantly enhances my ability to monitor low light environments with crystal clear imagery. The interface is user-friendly and I appreciate the detailed welcome guidance provided. It's become an essential tool in my security arsenal. Highly recommend!

user_7iSgTRdV
I've been using nightvision-mcp for a while now, and it has significantly improved my security workflow. The clarity of the night vision is exceptional, and the features are user-friendly. I especially appreciate how nvsecurity has ensured the application runs smoothly across different platforms. Highly recommend for anyone needing reliable night vision capabilities!

user_BHhksVFm
I've been using nightvision-mcp by nvsecurity and I'm thoroughly impressed. This tool provides exceptional night vision capabilities, enhancing visibility and security in low-light conditions. It's user-friendly and reliable, ensuring that I feel safe and secure at all times. Highly recommended for anyone looking to enhance their night-time security measures.

user_A8WjKQA6
Nightvision-MCP is an excellent tool for enhancing security monitoring capabilities. Created by nvsecurity, it offers outstanding night vision features that are crucial for real-time surveillance. The user interface is intuitive, and the setup was quick and straightforward. Highly recommend this product for anyone looking to improve their security system.

user_Ximuc95m
Nightvision-mcp is an incredible application by nvsecurity that enhances night vision capabilities significantly. It offers seamless integration, a user-friendly interface, and outstanding performance. Highly recommended for anyone needing reliable night surveillance.

user_x4uTCPds
As a dedicated user of the nightvision-mcp, I can confidently say that this product has significantly improved my security monitoring system. The clarity and precision of the night vision are unparalleled, making it an essential tool for any security setup. Kudos to nvsecurity for developing such a reliable and effective product! Highly recommend!

user_43NyoSLM
Nightvision-MCP by nvsecurity is an exceptional tool that has greatly enhanced my night-time security efforts. The product's intuitive interface and robust features make it easy to monitor any environment in low light conditions. I've found the real-time alerts and detailed analytics particularly useful. Highly recommend to anyone in need of reliable night vision capabilities!

user_K7aMaEGP
The Nightvision-MCP by NVSecurity is a game-changer for nighttime security applications. Its advanced night vision capabilities provide clear and reliable monitoring even in complete darkness. As a loyal user, I appreciate its consistent performance and easy integration into existing systems. An essential tool for anyone serious about night-time surveillance!

user_HPehaGHp
Nightvision-mcp by NVSecurity is a phenomenal tool. It significantly enhances nighttime visibility, making surveillance more effective and reliable. The clear, user-friendly interface ensures ease of use, even for beginners. If you need top-notch night vision capabilities for your security system, this application is a must-have.

user_nkctRDc5
Nightvision-mcp by NVSecurity is an outstanding application! It offers unparalleled night vision capabilities, making it perfect for nocturnal surveillance and security tasks. The user-friendly interface and seamless performance truly stand out. Highly recommended for anyone seeking reliable and efficient night vision solutions!

user_MnAuE2cU
I'm absolutely impressed with nightvision-mcp by nvsecurity. It offers outstanding night vision capabilities that are perfect for securing my property after dark. The user interface is intuitive, making it easy for anyone to navigate. Since using this app, I feel much safer and more in control of my home security. Highly recommend!