Enables autonomous repository management by programmatically creating branches and committing dependency updates as part of the remediation process.
Integrates with GitHub to scan repositories for vulnerabilities using the GitHub Advisory Database and automates the creation and management of pull requests for fixes.
Provides specialized workflows for GitHub Actions to automate periodic vulnerability scanning and the dispatching of triage tasks.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Git-Fabric CVEscan for high severity vulnerabilities and open fix PRs"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
@git-fabric/cve
CVE detection-to-remediation fabric app. Scan, enrich, triage, and fix vulnerabilities across managed repos — autonomously.
Part of the git-fabric ecosystem.
Architecture
Five composable layers, each independently consumable:
Layer | What it does | Side effects? |
Detection | Reads dependency manifests, queries GitHub Advisory Database | No (produces findings) |
Intelligence | Enriches CVEs from NVD with CVSS scores, status, CWE | No (pure data transform) |
Decision | Applies severity policy, produces triage plans | No (pure logic) |
Action | Creates branches, commits dependency bumps, opens PRs | Yes (writes to GitHub) |
State | Manages the CVE queue (JSONL), dedup, filtering, stats | Yes (writes to state repo) |
Quick Start
As an MCP Server
Claude Desktop Config
CLI
MCP Tools
Tool | Description |
| Scan managed repos for vulnerable dependencies via GHSA |
| Fetch enriched details for a CVE from NVD |
| Batch enrich and rank multiple CVEs by severity |
| Process pending queue entries and open PRs per policy |
| List queue entries filtered by status/severity |
| Queue health dashboard |
| Manually update entry status (e.g. skip with reason) |
Severity Policy
The decision layer applies configurable policy:
Severity | Default Action | PR Type |
CRITICAL | Auto-PR | Confirmed |
HIGH | Auto-PR | Draft |
MEDIUM | Skip | Manual review |
LOW | Skip | Noise reduction |
Override via CLI flags or MCP tool arguments:
GitHub Actions
Two workflows for autonomous operation:
cve-scan.yml— Weekly Monday scan, queries GHSA for all managed repos, queues findingscve-triage.yml— Dispatch-only, reads queue, applies policy, opens PRs
The scan explicitly dispatches triage after completing — no push-trigger race condition.
Required Secrets & Variables
Name | Type | Description |
| Secret | GitHub token with repo + workflow access |
| Secret | NVD API key (optional, raises rate limit 5→50 req/30s) |
| Variable | State repo path (e.g. |
| Variable | Comma-separated repos to manage |
Consuming from git-steer
git-steer can delegate to the fabric by implementing the GitHubAdapter and StateAdapter interfaces:
Project Structure
License
MIT