VulniCheck provides comprehensive security analysis for Python projects and GitHub repositories using AI-powered vulnerability detection.
[!CAUTION] MCP servers can execute code on your system. Only install MCP servers from trusted sources after reviewing their code and understanding the permissions they require.
The simplest way to get started is to ask claude: Hey Claude, follow instructions at https://raw.githubusercontent.com/andrasfe/vulnicheck/refs/heads/main/CLAUDE_INSTALL.md to install this MCP server.
Once installed, simply ask Claude Code:
"Run a comprehensive security check on my project"
"Run a comprehensive security check on https://github.com/owner/repo"
"Check this directory for security vulnerabilities"
VulniCheck will:
- ✅ Scan dependencies for known vulnerabilities
- ✅ Detect exposed secrets and credentials
- ✅ Analyze Dockerfiles for security issues
- ✅ Validate MCP configurations
- ✅ Generate AI-powered risk assessments
- ✅ Provide actionable remediation recommendations
- Comprehensive Coverage: Queries 5+ vulnerability databases (OSV.dev, NVD, GitHub Advisory, CIRCL, Safety DB)
- GitHub Integration: Scan any public/private GitHub repository directly
- AI-Powered Analysis: Uses OpenAI/Anthropic APIs for intelligent security assessment
- Secrets Detection: Finds exposed API keys, passwords, and credentials
- Docker Security: Analyzes Dockerfiles for vulnerable dependencies
- Smart Caching: Avoids redundant scans with commit-level caching
- Zero Config: Works out of the box, enhanced with optional API keys
- Python 3.10+
- Claude Code or compatible MCP client
- setup.py files: Currently not supported for dependency scanning. The scanner only supports
requirements.txt
,pyproject.toml
, and lock files. Projects usingsetup.py
for dependency management will need to generate arequirements.txt
file or migrate topyproject.toml
.
- Documentation: See DETAILS.md for complete documentation
- Issues: Report problems at https://github.com/andrasfe/vulnicheck/issues
- Development: Contributions welcome! See DETAILS.md for development setup
DISCLAIMER: Vulnerability data provided "AS IS" without warranty. Users responsible for verification. See DETAILS.md for full disclaimer.