check_code
Analyze code snippets for OWASP Top 10 security vulnerabilities including XSS and SQL injection. Specify language and optional framework for targeted scanning.
Instructions
Analyze inline code for security vulnerabilities (OWASP Top 10, XSS, SQL injection, insecure patterns). Pass code as a string parameter. For scanning files on disk, use scan_file instead. Example: check_code({code: 'app.get(...)', language: 'javascript'})
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| code | Yes | The code snippet to analyze | |
| language | Yes | Programming language of the code | |
| framework | No | Framework context (e.g. express, nextjs, fastapi, react, django) | |
| format | No | Output format: markdown (human) or json (machine-readable for agents) | markdown |