Know where you stand.
Open-source DNS & email security scanner for Claude, Cursor, VS Code, and MCP clients across Streamable HTTP, stdio, and legacy HTTP+SSE.
Claude Desktop (one-click install):
Download the Blackveil DNS extension and open it โ all 51 tools available instantly. Verify your download.
Claude Code (one command):
claude mcp add --transport http blackveil-dns https://dns-mcp.blackveilsecurity.com/mcpThen ask: scan anthropic.com
Smithery (one command):
smithery mcp add MadaBurns/bv-mcpVerify the endpoint is live:
curl https://dns-mcp.blackveilsecurity.com/healthNo install. No API key. One URL for hosted HTTP:
Endpoint https://dns-mcp.blackveilsecurity.com/mcp
Transport Streamable HTTP ยท JSON-RPC 2.0
Auth None required
Transport support:
Streamable HTTP:POST /mcp,GET /mcp,DELETE /mcpNative stdio:blackveil-dns-mcpCLI from theblackveil-dnsnpm packageLegacy HTTP+SSE:GET /mcp/ssebootstrap stream plusPOST /mcp/messages?sessionId=...
- 80+ checks across 20 categories โ SPF, DMARC, DKIM, DNSSEC, SSL/TLS, MTA-STS, NS, CAA, MX, BIMI, TLS-RPT, subdomain takeover, lookalike domains, HTTP security headers, DANE, shadow domains, TXT hygiene, MX reputation, SRV, zone hygiene
- Maturity staging โ Stage 0-4 classification (Unprotected to Hardened) with score-based capping to prevent inflated labels
- Trust surface analysis โ detects shared SaaS platforms (Google, M365, SendGrid) and cross-references DMARC enforcement to determine real exposure
- Guided remediation โ
generate_fix_planproduces provider-aware prioritized actions; record generators output ready-to-publish records;validate_fixconfirms whether a fix was applied successfully - Supply chain mapping โ
map_supply_chaincorrelates DNS signals to build a full third-party dependency graph with trust levels and risk signals - Attack path simulation โ
simulate_attack_pathsenumerates specific paths (spoofing, takeover, hijack) with severity, steps, and mitigations - Compliance mapping โ
map_compliancemaps scan findings to NIST 800-177, PCI DSS 4.0, SOC 2, and CIS Controls - Self-tuning scoring โ adaptive weights adjust category importance based on patterns seen across scans via Durable Object telemetry
- Per-tier analytics โ usage tracking by auth tier with operator API for tier summaries, key-level usage, and daily digests
- Passive and read-only โ all checks use public Cloudflare DNS-over-HTTPS; no authorization required from the target
51 MCP tools ยท 7 prompts ยท 6 resources
Email Auth Infrastructure Brand & Threats Meta
โโโโโโโโโโโโ โโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโโ
check_spf check_dnssec check_bimi scan_domain
check_dmarc check_ns check_tlsrpt batch_scan
check_dkim check_caa check_lookalikes compare_domains
check_mta_sts check_ssl check_shadow_domains compare_baseline
check_mx check_http_security explain_finding
check_mx_reputation check_dane Intelligence
check_subdomailing check_dane_https โโโโโโโโโโโโโโ Remediation
check_svcb_https get_benchmark โโโโโโโโโโโโโโ
DNS Hygiene check_srv get_provider_ generate_fix_plan
โโโโโโโโโโโโ check_zone_hygiene insights generate_spf_record
check_txt_hygiene check_resolver_ assess_spoofability generate_dmarc_record
consistency map_supply_chain generate_dkim_config
resolve_spf_chain generate_mta_sts_policy
discover_subdomains generate_rollout_plan
map_compliance validate_fix
simulate_attack_paths
analyze_drift
+ check_subdomain_takeover (internal โ runs inside scan_domain)
The server is continuously validated using a comprehensive chaos test suite that covers all 9 detected MCP client types:
- Interactive clients:
claude_code,cursor,vscode,claude_desktop,windsurf(auto-format:compact) - Non-interactive clients:
mcp_remote,blackveil_dns_action,bv_claude_dns_proxy,unknown(auto-format:full)
The test suite ensures session stability, authentication precedence, and transport-specific edge cases across Streamable HTTP and Legacy SSE.
Run the chaos tests locally: python3 scripts/chaos/chaos-test-clients.py
MCP Client
โ
โ POST /mcp (JSON-RPC 2.0)
โ
โโโโโผโโโโโโโโโโโโโโโโโโโโโโโ
โ Cloudflare Worker โ
โ โ
โ Hono โโบ Origin check โ
โ โโบ Auth โ
โ โโบ Rate limiting โ
โ โโบ Session mgmt โ
โโโโโฌโโโโโโโโโโโโโโโโโโโโโโโ
โ
โโโโโผโโโโโโโโโโโโโโโโโโโโโโโ
โ Tool Handlers โ
โ 16 checks in parallel โ
โโโโโฌโโโโโโโโโโโโโโโโโโโโโโโ
โ
โโโโโผโโโโโโโโโโโโโโโโโโโโโโโ
โ Generic Scoring Engine โ
โ Three-tier model โ
โโโโโฌโโโโโโโโโโโโโโโโโโโโโโโ
โ
โโโโโผโโโโโโโโโโโโโโโโโโโโโโโ
โ Cloudflare DoH โ
โ DNS-over-HTTPS โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโ
- Generic Scoring Engine: Runtime-agnostic, string-keyed three-tier scoring with configurable weights
- WASM Policy Engine: High-performance permission and token checks via
bv-wasm-core - Reliable Sessions: Hardened tombstone logic prevents race-condition revival of terminated sessions
- Adaptive Scoring: Durable Object telemetry adjusts weights based on real-world distributions
- Client Awareness: Automatic response formatting (
compactvsfull) based on clientUser-Agent
The free tier requires no authentication. Authenticated requests bypass per-IP rate limits and follow your tier's daily quota. Three authentication methods are supported:
- Header:
Authorization: Bearer <KEY> - Query Param:
?api_key=<KEY>(for clients that can't send custom headers โ Smithery, Claude Code) - OAuth 2.1: authorization-code flow with PKCE, discovered via
/.well-known/oauth-authorization-serverโ used by the Claude mobile custom connector.
For full hosted setup examples, stdio usage, OAuth setup, and legacy fallback endpoints, see docs/client-setup.md.
| Free | Pro | Enterprise | |
|---|---|---|---|
| Price | $0 | $39/mo | Contact us |
| Scans/day | 75 | 500 | 10,000+ |
| Checks/day | 200 | 5,000 | Unlimited |
| Rate limit | 50 req/min | None | None |
| API access | Yes | Yes | Yes |
| MCP access | Yes | Yes | Yes |
These demonstrate core functionality โ paste any of them into Claude with the Blackveil DNS connector enabled:
| Prompt | What it does |
|---|---|
Scan blackveilsecurity.com and tell me what needs fixing |
Full security audit โ score, grade, prioritized findings |
Compare the email security of google.com and microsoft.com |
Side-by-side comparison of two domains' postures |
Generate a DMARC record for example.com with reject policy |
Produces a ready-to-publish DNS record |
What attack paths exist for example.com? |
Enumerates spoofing, takeover, and hijack vectors |
Map example.com's compliance against NIST 800-177 |
Maps findings to compliance framework controls |
- Bug reports & feature requests: GitHub Issues
- Security vulnerabilities: security@blackveilsecurity.com (see SECURITY.md)
- General questions: GitHub Discussions
This tool is intended for authorized security assessments of domains you own or have explicit permission to test. Do not use it for unauthorized reconnaissance, harassment, or any activity that violates applicable laws. Findings from attack simulation, spoofability, and subdomain discovery tools should be used to improve your own security posture, not to exploit others.
If you discover a vulnerability in a third-party domain, please follow coordinated disclosure practices.
Built and maintained by BLACKVEIL โ NZ-owned cybersecurity consultancy.
Privacy Policy ยท License (BUSL-1.1 โ MIT on 2030-03-17)
