adv_scan_code
Scan source code for security vulnerabilities using customizable severity thresholds, exploit examples, and validation techniques. Results are saved in JSON or Markdown formats for detailed analysis.
Instructions
Scan source code for security vulnerabilities. Results are saved as .adversary.json or .adversary.md in the specified directory.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
content | Yes | Source code content to scan | |
include_exploits | No | Whether to include exploit examples | |
output_format | No | Output format for results (json or markdown) | json |
path | No | Directory path where results should be saved | . |
severity_threshold | No | Minimum severity threshold (low, medium, high, critical) | medium |
use_llm | No | Whether to include LLM analysis prompts (for use with your client's LLM) | |
use_semgrep | No | Whether to include Semgrep analysis | |
use_validation | No | Whether to use LLM validation to filter false positives |