SigilAI Docs
  • Introduction
    • Overview
    • Competitor Analysis
    • Key Features
    • Quick Start
  • Business Value
    • Market Need
    • Security Landscape
    • Use Cases
    • ROI & Benefits
  • Architecture
    • System Overview
    • MCP Integration
    • Components
  • Security Model
  • Technical Guide
    • API Reference
  • Resources
    • FAQ
  • Installation
Powered by GitBook
On this page
  1. Introduction

Quick Start

PreviousKey FeaturesNextMarket Need

Last updated 3 months ago

CtrlK
  • Quick Start Guide: Using SigilAI Cloud MCP Server
  • Prerequisites
  • Connecting Your AI Client to SigilAI MCP Server
  • Verifying the Connection
  • Next Steps

Quick Start Guide: Using SigilAI Cloud MCP Server

This guide helps you quickly connect your AI development tools and assistants to the SigilAI cloud-hosted Model Context Protocol (MCP) server. SigilAI provides a managed MCP service, allowing you to easily integrate powerful security scanning into your workflows.

Prerequisites

Before you begin, ensure you have:

  1. API Key: Obtain your API key from the SigilAI Telegram bot at https://t.me/SigilAIBot. This key is essential for authenticating with the MCP server.

  1. MCP Server Endpoint: The SigilAI MCP Server URL is https://mcp.sigilai.io/sse .

  2. Compatible AI Client: An AI assistant or development tool that supports MCP integration, such as Cline, Cursor, or Claude Desktop.

Connecting Your AI Client to SigilAI MCP Server

The SigilAI MCP server allows various AI clients to access its security tools. Below are configuration examples for popular clients. The general principle involves adding SigilAI as an MCP server provider within your client's settings, using your API key and the server endpoint.

To configure SigilAI MCP server access within Cline:

  1. Access MCP Settings:

    • You (as the user interacting with Cline) would typically inform Cline: "Please add a new MCP server configuration."

    • Cline would then guide you or use its internal capabilities to update its MCP server list.

Cursor is an AI-first code editor. To configure an external MCP server like SigilAI (assuming Cursor supports generic MCP server integration):

  1. Open Cursor Settings:

    • Navigate to Cursor's settings/preferences panel. This is often accessible via File > Settings or a shortcut like Ctrl+, / Cmd+,.

If the Claude Desktop application supports generic MCP server integration:

  1. Access Settings:

    • Open the Claude Desktop application.

    • Look for a settings, preferences, or extensions menu. This could be under a "File" menu, a gear icon, or your profile.

Verifying the Connection

Once configured, your AI client should ideally indicate a successful connection or list the tools available from the SigilAI MCP server (e.g., scan_url, scan_file).

You can perform a simple test by asking your AI client to use one of SigilAI's tools:

  • Ask to scan a known safe URL: "Please scan the URL https://www.google.com using SigilAI." The expected response should indicate the URL is safe.

  • Ask to scan a (non-malicious) test file content (if applicable to your client): "Please scan this JavaScript code for issues using SigilAI: function greet() { console.log('Hello'); }" The expected response should indicate no critical vulnerabilities.

Next Steps

With your AI client successfully connected to the SigilAI Cloud MCP Server, you can now:

  • Integrate into Workflows: Start using SigilAI's security scanning tools within your AI-assisted development, research, or content analysis tasks.

  • Review API Reference: For more technical details on tool invocation, see the API Reference.

If you encounter issues, consult the FAQ & Troubleshooting page or contact SigilAI support.

Provide SigilAI MCP Server Details: When prompted by Cline, or by editing Cline's MCP configuration file (if accessible to you as a user/developer of Cline), provide the following:

  • Server Name: SigilAI (or any preferred display name)

  • Server URL / Endpoint: https://mcp.sigilai.io/sse (or your specific endpoint)

  • Authentication Method: Bearer Token

  • API Key / Token: Your SigilAI API Key

  • (Optional) Instructions/Description: You can copy the server instructions from the SigilAI MCP server if your client supports displaying them.

  • Save and Activate:

    • Confirm the settings. Cline should then be able to connect to the SigilAI MCP server and list its available tools (e.g., scan_url, scan_file).

  • Usage Example with Cline:

    User: Cline, please scan the URL https://example-suspicious.com using SigilAI.
    
    Cline: (Internally makes an MCP tool_call to SigilAI's scan_url tool)
           Okay, I've scanned https://example-suspicious.com using SigilAI. 
           The result indicates it is potentially malicious due to [reason]. 
           It's advisable not to visit this site.
  • Locate AI / MCP / Tool Settings:

    • Look for a section related to "AI Features," "External Tools," "Model Context Protocol," or "Custom LLM Tools." The exact naming may vary.

  • Add New MCP Server:

    • There might be an option to "Add MCP Server," "Configure Tool Provider," or similar.

    • Enter the following details:

      • Name: SigilAI Security Scanner

      • Endpoint URL: https://mcp.sigilai.io/sse (or your specific endpoint)

      • Authentication Type: Select "Bearer Token" or "API Key."

      • API Key: Paste your SigilAI API Key.

      • (Optional) Description: "Security scanning tools from SigilAI."

  • Save Configuration:

    • Apply or save the settings. Cursor should now attempt to connect to the SigilAI MCP server.

  • Usage Example within Cursor:

    • While editing code, you might invoke an AI chat or command:

      User: @SigilAI scan this file for vulnerabilities.
    • Cursor, using its AI capabilities and the configured MCP connection, would send the file content to SigilAI's scan_file tool and display the results.

  • (Note: Specific steps for Cursor depend on its current MCP integration features. Refer to Cursor's official documentation for the most accurate instructions.)

    Find MCP / External Tools Configuration:

    • Search for options like "Connected Services," "Tool Integrations," or "Model Context Protocol Servers."

  • Add SigilAI MCP Server:

    • Click an "Add New Server" or similar button.

    • Input the SigilAI server details:

      • Server Identifier: SigilAI_Cloud

      • MCP Endpoint: https://mcp.sigilai.io/sse (or your specific endpoint)

      • Authentication: Choose "Bearer Token" or "API Key" and provide your SigilAI API Key.

      • Display Name: SigilAI Security Tools

  • Apply and Verify:

    • Save the configuration. The Claude Desktop app might attempt to connect and list available tools from SigilAI.

  • Usage Example with Claude Desktop:

    • In a chat with Claude:

      User: Claude, can you check if this URL is safe using SigilAI: http://phishy-link.info
      
      Claude: (Leveraging the SigilAI MCP integration) 
              I've checked http://phishy-link.info with SigilAI. 
              It's flagged as a high-risk phishing site. I advise against visiting it.
  • (Note: Specific steps for Claude Desktop depend on its MCP integration capabilities. Always consult the official Claude Desktop documentation.)