MCP Tool · Discovery

tls_audit

Connect once over TLS, capture the certificate chain + negotiated protocol/cipher, and surface findings (expired, expiring-soon, self-signed, weak protocol, weak cipher).

Input

NameTypeRequiredDescription
targetstringyesHostname or IP literal to audit (e.g. example.com).
portnumbernoTCP port the TLS listener is on. Defaults to 443.

REST API

curl -H "Authorization: Bearer sic_..." \
  -H "Content-Type: application/json" \
  -X POST https://sicenter.io/api/tools/tls_audit \
  -d '{"target":"<string>"}'

MCP server

# MCP — call from Claude Desktop, Cursor, or any MCP client
{
  "jsonrpc": "2.0",
  "id": 1,
  "method": "tools/call",
  "params": {
    "name": "tls_audit",
    "arguments": {
        "target": "<string>"
    }
  }
}

Endpoint: https://sicenter.io/api/mcp. See /mcp for connection guides for Claude Desktop, Cursor, and custom orchestrators.

More tools in Discovery


Browse the full MCP server documentation or jump to the API key management page in your dashboard.