II.
ToolServer JSON
Structured · livetool-server:mcp-snyk
Snyk MCP Server json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "tool-server:mcp-snyk",
"_kind": "ToolServer",
"_file": "extensions/tool-servers/mcp-security.yaml",
"_cluster": "extensions",
"attributes": {
"displayName": "Snyk MCP Server",
"description": "MCP server providing access to Snyk security scanning.\nEnables AI agents to run SAST, SCA, IaC, and container scans,\nquery vulnerability databases, generate SBOMs, and triage findings.\n",
"protocol": "mcp",
"category": "security",
"repoUrl": "https://github.com/snyk/mcp-server",
"maintainer": "Snyk",
"mcpTransports": [
"mcp-transport:stdio"
]
},
"outgoingEdges": [
{
"from": "tool-server:mcp-snyk",
"to": "role:security-reviewer",
"kind": "supports_work",
"attributes": {
"confidence": "high",
"evidence": "Dependency and container vulnerability results support security review."
}
},
{
"from": "tool-server:mcp-snyk",
"to": "role:dependency-updater",
"kind": "supports_work",
"attributes": {
"confidence": "high",
"evidence": "Dependency vulnerability data informs update priority and remediation."
}
},
{
"from": "tool-server:mcp-snyk",
"to": "responsibility:run-security-scans",
"kind": "supports_work",
"attributes": {
"confidence": "high",
"evidence": "Snyk is a security scanning surface."
}
},
{
"from": "tool-server:mcp-snyk",
"to": "workflow:vulnerability-management",
"kind": "supports_work",
"attributes": {
"confidence": "high",
"evidence": "Findings, severity, and remediation metadata project vulnerability workflows."
}
},
{
"from": "tool-server:mcp-snyk",
"to": "tool:snyk",
"kind": "integrates_with",
"attributes": {}
},
{
"from": "tool-server:mcp-snyk",
"to": "domain:cybersecurity",
"kind": "lib_applies_to_domain",
"attributes": {}
},
{
"from": "tool-server:mcp-snyk",
"to": "domain:software-engineering",
"kind": "lib_applies_to_domain",
"attributes": {}
}
],
"incomingEdges": []
}