loading…
Search for a command to run...
loading…
Enables deep security auditing of web applications directly from AI IDEs including Cursor and Claude Code. Scans URLs for vulnerabilities, returns security scor
Enables deep security auditing of web applications directly from AI IDEs including Cursor and Claude Code. Scans URLs for vulnerabilities, returns security scores with SHIP/BLOCK verdicts, and provides specific fix prompts for remediation.
MCP server for Sekrd — deep security audit for AI-built apps. Run security scans directly from Cursor, Claude Code, and other AI IDEs.
npx -y @sekrd/mcp-server
claude mcp add sekrd -- npx -y @sekrd/mcp-server
With API key (paid plans, unlimited scans):
claude mcp add sekrd -e SEKRD_API_KEY=your_key -- npx -y @sekrd/mcp-server
Add to .cursor/mcp.json:
{
"mcpServers": {
"sekrd": {
"command": "npx",
"args": ["-y", "@sekrd/mcp-server"],
"env": {
"SEKRD_API_KEY": "your_key_here"
}
}
}
}
Add to claude_desktop_config.json:
{
"mcpServers": {
"sekrd": {
"command": "npx",
"args": ["-y", "@sekrd/mcp-server"],
"env": {
"SEKRD_API_KEY": "your_key_here"
}
}
}
}
Get your key at sekrd.com/dashboard/settings.
| Tool | Description |
|---|---|
scan_url(url) |
Full security scan. Returns score, verdict (SHIP/BLOCK), findings + fix prompts. |
get_scan(scan_id) |
Get results of a previous scan. |
list_findings(scan_id) |
Get only findings with fix prompts for your IDE. |
You: Scan https://my-app.vercel.app for security issues
Sekrd: Score 34/100 — BLOCK
3 critical, 5 high, 2 medium findings
1. [CRITICAL] Stripe live secret key exposed in client bundle
Fix: Move 'sk_live_...' to .env file and use NEXT_PUBLIC_ prefix only for public keys
2. [CRITICAL] Supabase RLS policy USING(true) on users table
Fix: Replace with USING(auth.uid() = user_id)
MIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"sekrd-security-scanner": {
"command": "npx",
"args": []
}
}
}PRs, issues, code search, CI status
Database, auth and storage
Reference / test server with prompts, resources, and tools.
Secure file operations with configurable access controls.