@@ -47,10 +47,10 @@ type getClustersForCVETool struct {
4747 client * client.Client
4848}
4949
50- // NewGetClustersForCVETool creates a new get_clusters_for_cve tool.
50+ // NewGetClustersForCVETool creates a new get_clusters_with_orchestrator_cve tool.
5151func NewGetClustersForCVETool (c * client.Client ) toolsets.Tool {
5252 return & getClustersForCVETool {
53- name : "get_clusters_for_cve " ,
53+ name : "get_clusters_with_orchestrator_cve " ,
5454 client : c ,
5555 }
5656}
@@ -68,8 +68,12 @@ func (t *getClustersForCVETool) GetName() string {
6868// GetTool returns the MCP Tool definition.
6969func (t * getClustersForCVETool ) GetTool () * mcp.Tool {
7070 return & mcp.Tool {
71- Name : t .name ,
72- Description : "Get list of clusters affected by a specific CVE" ,
71+ Name : t .name ,
72+ Description : "Get list of clusters where a specified CVE is detected in Kubernetes orchestrator components" +
73+ " (kube-apiserver, kubelet, etcd, etc.)." +
74+ " Returns clusters where the Kubernetes infrastructure itself has the vulnerability." +
75+ " For comprehensive CVE analysis, also check get_deployments_for_cve (application workloads)" +
76+ " and get_nodes_for_cve (node OS packages)." ,
7377 InputSchema : getClustersForCVEInputSchema (),
7478 }
7579}
@@ -87,7 +91,8 @@ func getClustersForCVEInputSchema() *jsonschema.Schema {
8791 schema .Required = []string {"cveName" }
8892
8993 schema .Properties ["cveName" ].Description = "CVE name to filter clusters (e.g., CVE-2021-44228)"
90- schema .Properties ["filterClusterId" ].Description = "Optional cluster ID to verify if a specific cluster is affected"
94+ schema .Properties ["filterClusterId" ].Description = "Optional cluster ID to verify if a specified CVE" +
95+ " is detected on that cluster"
9196
9297 return schema
9398}
0 commit comments