Overview
VulnZap integrates with modern IDEs through the Model Context Protocol (MCP), providing real-time vulnerability detection as you code and when AI assistants generate code.Supported IDEs
Cursor
Full MCP support with agent-aware scanning
Windsurf
Real-time inline detection and AI guardrails
Cline
Agentic workflow protection
VS Code
Via MCP extension (beta)
Model Context Protocol (MCP)
VulnZap exposes seven MCP tools for AI agent integration. These tools enable autonomous security scanning during development workflows.MCP Tools Reference
Tool 1: vulnzap_scan_diff
Performs fast, non-blocking incremental scan on git diff.
Purpose: Scan only changed files since a specific commit reference. Designed for frequent use during active development.
Input Schema:
Tool 2: vulnzap_status
Retrieve scan results for a specific scan ID or latest scan.
Purpose: Check completion status and retrieve vulnerability findings. Primary mechanism for agents to discover security issues.
Input Schema:
- Initial poll: 5 seconds
- Subsequent polls: 5-30 seconds with exponential backoff
- Do not poll continuously
Tool 3: vulnzap_full_scan
Comprehensive repository-wide security scan.
Purpose: Baseline security analysis of entire codebase. Reserved for pre-deployment or pre-push workflows.
Input Schema:
- Significantly slower than diff scans
- Scans entire repository history
- Use sparingly (pre-push, pre-deploy only)
- Poll results via
vulnzap_status
Tool 4: vulnzap_report
Generate human-readable scan report in markdown format.
Purpose: Create formatted vulnerability reports for PR descriptions, documentation, or audit logs.
Input Schema:
- Vulnerability summary
- Severity breakdown
- Affected files and line numbers
- Remediation recommendations
- Reference links
Tool 5: vulnzap_security_assistant
Start file watcher for incremental security analysis.
Purpose: Monitor directory for changes and perform continuous security scanning. Designed for active development sessions.
Input Schema:
- Automatic timeout: 60 seconds of inactivity
- Timeout resets on each file change
- Session data cached in
.vulnzap/client/sessions/
Tool 6: vulnzap_security_assistant_results
Retrieve results from active security assistant session.
Purpose: Fetch vulnerability findings from incremental scan session.
Input Schema:
- Wait 10+ seconds after code changes before calling
- Use
waitparameter to add additional delay if needed - Session must be active (not timed out)
Tool 7: vulnzap_security_assistant_stop
Terminate security assistant session and retrieve final results.
Purpose: Explicitly stop file watching and get final scan results.
Input Schema:
- Manual session termination
- Retrieve final results before timeout
- Clean up resources after development session
MCP Agent Workflow
Recommended integration pattern for AI agents:Initialization Phase
Active Development Phase
Pre-Commit Phase
Pre-Push Phase
Continuous Monitoring (Alternative)
Configuration
IDE MCP Configuration
Cursor IDE
File:.cursor/mcp.json
Windsurf IDE
File:.codeium/windsurf/mcp_config.json
Cline
Configured viavulnzap connect --ide cline. Manual configuration requires setting MCP server command to npx vulnzap mcp with VULNZAP_API_KEY environment variable.
Environment Variables
VULNZAP_API_KEY: Authentication key for API accessVULNZAP_DEBUG: Enable debug logging for MCP server