Quick Start
Last updated
Last updated
This guide helps you quickly connect your AI development tools and assistants to the SigilAI cloud-hosted Model Context Protocol (MCP) server. SigilAI provides a managed MCP service, allowing you to easily integrate powerful security scanning into your workflows.
Before you begin, ensure you have:
API Key: Obtain your API key from the SigilAI Telegram bot at https://t.me/SigilAIBot. This key is essential for authenticating with the MCP server.
MCP Server Endpoint: The SigilAI MCP Server URL is https://mcp.sigilai.io/sse
.
Compatible AI Client: An AI assistant or development tool that supports MCP integration, such as Cline, Cursor, or Claude Desktop.
The SigilAI MCP server allows various AI clients to access its security tools. Below are configuration examples for popular clients. The general principle involves adding SigilAI as an MCP server provider within your client's settings, using your API key and the server endpoint.
To configure SigilAI MCP server access within Cline:
Access MCP Settings:
You (as the user interacting with Cline) would typically inform Cline: "Please add a new MCP server configuration."
Cline would then guide you or use its internal capabilities to update its MCP server list.
Once configured, your AI client should ideally indicate a successful connection or list the tools available from the SigilAI MCP server (e.g., scan_url
, scan_file
).
You can perform a simple test by asking your AI client to use one of SigilAI's tools:
Ask to scan a known safe URL:
"Please scan the URL https://www.google.com using SigilAI."
The expected response should indicate the URL is safe.
Ask to scan a (non-malicious) test file content (if applicable to your client):
"Please scan this JavaScript code for issues using SigilAI: function greet() { console.log('Hello'); }"
The expected response should indicate no critical vulnerabilities.
With your AI client successfully connected to the SigilAI Cloud MCP Server, you can now:
Integrate into Workflows: Start using SigilAI's security scanning tools within your AI-assisted development, research, or content analysis tasks.
Review API Reference: For more technical details on tool invocation, see the API Reference.
If you encounter issues, consult the FAQ & Troubleshooting page or contact SigilAI support.
Provide SigilAI MCP Server Details: When prompted by Cline, or by editing Cline's MCP configuration file (if accessible to you as a user/developer of Cline), provide the following:
Server Name: SigilAI
(or any preferred display name)
Server URL / Endpoint: https://mcp.sigilai.io/sse
(or your specific endpoint)
Authentication Method: Bearer Token
API Key / Token: Your SigilAI API Key
(Optional) Instructions/Description: You can copy the server instructions from the SigilAI MCP server if your client supports displaying them.
Save and Activate:
Confirm the settings. Cline should then be able to connect to the SigilAI MCP server and list its available tools (e.g., scan_url
, scan_file
).
Usage Example with Cline:
User: Cline, please scan the URL https://example-suspicious.com using SigilAI.
Cline: (Internally makes an MCP tool_call to SigilAI's scan_url tool)
Okay, I've scanned https://example-suspicious.com using SigilAI.
The result indicates it is potentially malicious due to [reason].
It's advisable not to visit this site.
Locate AI / MCP / Tool Settings:
Look for a section related to "AI Features," "External Tools," "Model Context Protocol," or "Custom LLM Tools." The exact naming may vary.
Add New MCP Server:
There might be an option to "Add MCP Server," "Configure Tool Provider," or similar.
Enter the following details:
Name: SigilAI Security Scanner
Endpoint URL: https://mcp.sigilai.io/sse
(or your specific endpoint)
Authentication Type: Select "Bearer Token" or "API Key."
API Key: Paste your SigilAI API Key.
(Optional) Description: "Security scanning tools from SigilAI."
Save Configuration:
Apply or save the settings. Cursor should now attempt to connect to the SigilAI MCP server.
Usage Example within Cursor:
While editing code, you might invoke an AI chat or command:
User: @SigilAI scan this file for vulnerabilities.
Cursor, using its AI capabilities and the configured MCP connection, would send the file content to SigilAI's scan_file
tool and display the results.
(Note: Specific steps for Cursor depend on its current MCP integration features. Refer to Cursor's official documentation for the most accurate instructions.)
Find MCP / External Tools Configuration:
Search for options like "Connected Services," "Tool Integrations," or "Model Context Protocol Servers."
Add SigilAI MCP Server:
Click an "Add New Server" or similar button.
Input the SigilAI server details:
Server Identifier: SigilAI_Cloud
MCP Endpoint: https://mcp.sigilai.io/sse
(or your specific endpoint)
Authentication: Choose "Bearer Token" or "API Key" and provide your SigilAI API Key.
Display Name: SigilAI Security Tools
Apply and Verify:
Save the configuration. The Claude Desktop app might attempt to connect and list available tools from SigilAI.
Usage Example with Claude Desktop:
In a chat with Claude:
User: Claude, can you check if this URL is safe using SigilAI: http://phishy-link.info
Claude: (Leveraging the SigilAI MCP integration)
I've checked http://phishy-link.info with SigilAI.
It's flagged as a high-risk phishing site. I advise against visiting it.
(Note: Specific steps for Claude Desktop depend on its MCP integration capabilities. Always consult the official Claude Desktop documentation.)