Provides real-time OWASP ASVS security guidance, vulnerability scanning, and secure code fixes for AI coding agents during code generation
VSGuard MCP - Security guardrails for AI coding agents
VSGuard is the first MCP server that makes security automatic for AI-assisted development. It integrates OWASP ASVS and OWASP LLM Top 10 standards directly into your AI coding workflow, catching SQL injections, prompt injections, weak authentication, and 50+ other vulnerabilities as you code—not after deployment.
Overview
This MCP server integrates with Claude Code, Cursor, and other MCP-clients to enable proactive security during code generation. It helps AI agents write secure code from the start by providing:
OWASP ASVS Requirements - Real-time security guidance based on ASVS v4.0
Vulnerability Scanning - Static analysis using Semgrep with custom ASVS rules
Secure Code Fixes - Actionable remediation with code examples
Features
Three Core Tools
check_security_requirements- Get relevant ASVS requirements before writing codescan_code- Analyze code for vulnerabilities with ASVS mappingssuggest_fix- Generate secure code alternatives with explanations
Security Coverage
✅ Authentication (ASVS Chapter 2)
✅ Session Management (ASVS Chapter 3)
✅ Access Control (ASVS Chapter 4)
✅ Input Validation & Injection Prevention (ASVS Chapter 5)
✅ Cryptography (ASVS Chapters 6-9)
✅ Data Protection
Supported Languages
Python (primary)
JavaScript/TypeScript
Java, Go, Ruby, PHP, C/C++, C#, Rust (via Semgrep)
Quick Start
Works with Cursor and Claude Code! Use the HTTP-based configuration format:
If you prefer Smithery
To install VSGuard automatically via Smithery:
If you prefer remote installation
Configure the mcp.json for Claude Code/Cursor
Usage Examples
Example 1: Get Security Requirements during code generation
In Claude Desktop:
Claude will call:
Response:
Example 2: Scan Existing Code for Vulnerabilities
In Claude Desktop:
Claude will call:
Response:
Example 3: Get Secure Code Fix
In Claude Desktop:
Claude will call:
Response:
Testing
Coverage
Current implementation includes:
40+ ASVS Requirements across authentication, session management, input validation, and cryptography
25+ Custom Semgrep Rules detecting common vulnerabilities
10+ Fix Templates with secure code examples
Multiple Languages supported (Python, JavaScript, TypeScript, etc.)
Vulnerability Detection
SQL Injection (ASVS 5.3.4, 5.3.5)
Cross-Site Scripting (ASVS 5.3.3, 5.3.10)
Weak Password Validation (ASVS 2.1.1, 2.1.7)
Weak Cryptography (ASVS 6.2.2, 6.2.5)
Hardcoded Secrets (ASVS 2.3.1, 14.3.3)
Session Management Issues (ASVS 3.x)
XML External Entity (XXE) (ASVS 5.5.2)
Command Injection (ASVS 5.3.4)
And more...
How It Works
1. ASVS Requirements Database
The server loads OWASP ASVS v4.0 requirements from structured YAML files:
2. Static Analysis with Semgrep
Custom Semgrep rules detect ASVS violations:
3. Intelligent Mapping
Findings are automatically mapped to ASVS requirements by:
Vulnerability type (sql_injection → ASVS 5.3.4)
CWE ID (CWE-89 → ASVS 5.3.4, 5.3.5)
Code patterns (login endpoints → authentication requirements)
4. LLM-Optimized Output
All responses are formatted for maximum LLM comprehension:
Clear structure with headers and sections
Code examples with syntax highlighting
Severity indicators (🔴 🟠 🟡)
Actionable remediation steps
ASVS requirement references
🔧 Extending the Server
Add New ASVS Requirements
Create/edit YAML files in data/asvs/:
Add Custom Semgrep Rules
Create YAML files in data/rules/:
Add Fix Templates
Edit src/fixes/templates.py:
🤝 Contributing
Contributions welcome! Areas for improvement:
More ASVS Requirements - Cover additional chapters
More Languages - Expand language support
More Scanners - Integrate Bandit, detect-secrets
Better AI Integration - Improve LLM output formatting
Performance - Optimize scanning speed
⚡ Powered By
FastMCP 2.0 - Modern Python framework for MCP servers
Semgrep - Static analysis engine
OWASP ASVS - Security verification standard
📝 License
MIT License - see LICENSE file for details.
🔗 Resources
🙏 Acknowledgments
OWASP for the ASVS standard
Anthropic for the MCP protocol
Semgrep for the scanning engine
📧 Support
For issues, questions, or contributions, please open an issue on GitHub.
Built with ❤️ for secure AI-assisted development
This server cannot be installed