Code Security Scanner logo

Code Security Scanner

by 214070779GitHubWebsiteUpdated May 24, 2026

Scan local codebases for hardcoded secrets, vulnerable dependencies, and insecure code patterns. Supports 24+ secret patterns, 45+ CVEs, and 20+ insecure code patterns across Python, JavaScript, TypeScript, Go, Rust, Java, and more.

security
secrets
vulnerability-scanning
+3
|

How to pay

Subscribe

Monthly billing

$29/month

Predictable monthly cost with included usage. Best for steady, high-volume traffic.

  • Unlimited tools within plan limits
  • One API key, billed once a month
  • Cancel any time

Overview

The Code Security Scanner is an MCP server designed to identify security risks directly within your local development environment. By running static analysis and pattern matching locally, it allows you to detect vulnerabilities before code is ever pushed to a repository or deployed.

Key Capabilities

  • Comprehensive Auditing: Use scan_directory for recursive analysis of your entire project, covering secrets, vulnerable dependencies, and insecure coding patterns in one execution.
  • Granular Analysis: Utilize scan_secrets to identify hardcoded credentials, scan_dependencies to check manifests against known CVEs, and scan_code_patterns to catch injection vulnerabilities like SQLi or XSS.
  • Context-Aware Scanning: Leverage scan_file for targeted analysis of individual configuration or source files to verify security compliance before committing changes.
  • Flexible Reporting: All tools provide structured output in Markdown or JSON, ensuring findings—including file paths, line numbers, and remediation guidance—are easily readable by both developers and automated agents.

Use Cases

  • Proactive Security: Run scan_directory on your project root to catch high-severity vulnerabilities like exposed AWS keys or outdated, insecure packages before deployment.
  • Focused Code Review: Apply scan_code_patterns to specific directories (e.g., ./src) to detect insecure practices such as command injection or improper deserialization during active development.
  • Dependency Management: Use scan_dependencies to audit manifest files like package.json or pyproject.toml, identifying vulnerable packages against a built-in database of 45+ CVEs.

Who This Is For

This server is built for software engineers, security-conscious developers, and DevOps practitioners who need to enforce security standards locally. It is ideal for those who want to automate the identification of common security flaws without relying on external cloud-based scanning services.