Skip to main content
Glama
127,129 tools. Last updated 2026-05-05 08:38

"A server that scans projects for security vulnerabilities and recommends fixes" matching MCP tools:

  • Run a security audit on a server. Scans 30 categories with 457 checks, returns a score from 0 to 100, per-category scores, and quick wins.
  • Apply safe auto-fixes to a server. Audits, filters SAFE tier fixes, backs up, applies fixes, and re-audits to show score improvement. Dry-run for preview.
  • Run a security audit on any URL to check HTTPS, HSTS, CSP, X-Frame-Options, cookie flags, SSL certificate validity, and server disclosure. Get a security score and specific fixes needed.
    MIT
  • Query ZoomEye's vulnerability database by keyword to retrieve detailed security vulnerabilities including CVE IDs, severity, and affected versions for specific products or vendors.
    MIT
  • Scans a code directory, maps security findings to compliance controls (SOC2, PCI-DSS, HIPAA, GDPR, ISO27001, EUAIACT), and groups issues by control with a summary.

Matching MCP Servers

Matching MCP Connectors

  • Audit all project dependencies in one command: scans direct, transitive, and package manager vulnerabilities. Supply package.json path to receive a consolidated security report. Ideal for reviewing project security after cloning a new repo.
  • Scan an MCP server for security vulnerabilities, description quality, and architecture issues. Get a security rating from F to A+ with actionable recommendations for safe deployment.
    MIT
  • Scan project dependencies for security vulnerabilities using OSV.dev database. Choose scan modes for detailed reports, quick overviews, or critical issues only.
    MIT
  • Test a specific MCP server before installing or after updating by launching it with a command, checking all capabilities, and saving a run artifact. Optionally invoke tools to verify execution and analyze schemas for vulnerabilities.
    MIT
  • Scan MCP servers for security vulnerabilities including prompt injection, tool poisoning, and credential exposure. Returns findings with severity levels.
    MIT
  • Audits a single npm package for security: scans source code for malware, checks vulnerabilities via npm and GitHub Advisory, analyzes install scripts, and verifies license compatibility. Pass a specific version to audit instead of latest.
  • Explains a security finding with its danger, step-by-step fixes, and code examples to remediate vulnerabilities.
    Apache 2.0
  • Detects complex vulnerabilities and logic flaws in AI agents using advanced analysis, complementing pattern-based scanning. Scans specified paths, with results available after approximately 10 minutes.
    Apache 2.0
  • Use AI to find hidden security flaws—IDOR, business logic bugs, race conditions—that pattern-based scanners miss. Focus scans on specific vulnerability classes.
  • Automatically create GitHub Pull Requests with security fixes for vulnerabilities or IaC misconfigurations. Commits changes, pushes to a new branch, and opens a PR for review.
    MIT
  • Verify that a security fix resolves a specific vulnerability. Re-scans updated code against a rule ID and reports whether the fix was successful.
  • Detect security vulnerabilities across multiple files and produce a project-wide report with a security score to support comprehensive audits.