Skip to Content
logo

Docs

  • Home
  • Quick start
    • FAQ
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • What is SCA?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Use the platform
        • Sign-up and login
        • Interface and sections
        • Create and delete groups
        • Create another organization
        • Know your Groups section
        • Manage a group's configuration
        • Register payment information
        • See the target of evaluation's status and SBOM
        • Sort groups into portfolios
        • Invite contributing developers
        • Manage members
        • Manage your organization's authors
        • Understand roles
        • Import repositories fast and safely with OAuth
        • Manage environments
        • Manage repositories
        • Manage your credentials
        • Resolve events impeding tests
        • See retrieved repositories not yet added to any group
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • CVSS score adjustment
        • Examine the evidence of exploitability
        • Find reachable dependency vulnerabilities
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Vulnerability signature update
        • Ask the AI Agent
        • Ask via chat
        • Post comments
        • Send Fluid Attacks an email
        • Talk to a Pentester
        • Watch certifiable tutorial videos or get a demo
        • Vulnerability reporting
        • Standard compliance
        • ZTNA logs
        • Recent downloads
        • Common analytics
        • Organization analytics
        • Group analytics
        • Portfolio analytics
        • Charts options
        • CI Gate configuration
        • CI Gate executions
        • Security gates
        • Vulnerability acceptance
        • Prioritization attributes
        • Explore the user menu
        • Enable and disable notifications
        • Subscribe to News
        • Leave a group
      • Manage repositories
      • See vulnerabilities
        • Fluid Attacks' scanners
        • OWASP Benchmark results
        • Your feedback
      • Use the scanners
        • Local run
        • CI/CD integration
        • Understanding outputs
        • Findings exclusion
      • Use a configuration file
        • SAST scanner
        • SCA scanner
        • DAST scanner
        • APK scanner
      • Automatic remediation
      • Custom remediation guides
      • Introduction to Sorts
      • Sorts user guide
      • Connection mechanisms
      • Cloud connection
      • Egress connection
      • Connector connection
      • Types of authentication
      • AWS CodeCommit
    • Service-level agreement
      • Availability SLA
      • Response SLA
      • Accuracy SLA
      • False negatives
      • False positives
      • Scope
    • Support information
      • Changelog
        • 2023
        • 2024
        • 2025
        • 2026
      • Roadmap
      • AI functions
      • Attack surfaces
      • Binaries
      • Browsers
      • CI/CD
      • Clouds
      • CVEs for reachability
      • Evidence formats
      • Frameworks
      • IDE functionalities
      • Languages
      • Languages for fixes
      • Package managers
      • Remediation
      • SCM systems
      • Secrets
      • Standards
      • Ticketing systems
      • Documentation sections
  • Integrations
      • Local tools
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
      • Install the VS Code extension
      • View vulnerable lines, use fix options and more
      • VS Code extension error and solution catalog
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
      • Excluding files from analysis
      • Integrate with Azure DevOps Peer Reviewer Assistant
      • Integrate with GitLab Peer Reviewer Assistant
      • Troubleshooting
      • Introduction
      • Use the API
      • Learn the basics of the Fluid Attacks API
      • Things to know before using the API
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • D3
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
    • Pentesting tools
  • Compliance
    • Authentication
      • Clients
      • Password policies
      • Staff
    • Authorization
      • Access revocation
      • Clients
      • Employee termination
      • Endpoints
      • Secret rotation
      • Sessions
      • Staff
    • Availability
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
    • Confidentiality
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
    • Integrity
      • Applicant evaluation
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Monitoring
      • Production data isolation
      • Secure emails
      • SLSA compliance
      • Standard timezone
      • Static website
      • Training plan
    • Non-repudiation
      • Everything as code
      • Extensive logs
    • Privacy
      • Data privacy policy
      • Data retention policy
      • Data use policy
      • Email obfuscation
      • Time tracking
      • Manual for the NDR
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Data transmission
      • Unsubscribe email
      • Use of cookies
    • Resilience
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
    • Transparency
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • ArmorCode
    • Arnica
    • Astra
    • Backslash
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security (GHAS)
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype Lifecycle
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 
  • Home
  • Quick start
    • FAQ
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • What is SCA?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Use the platform
        • Sign-up and login
        • Interface and sections
        • Create and delete groups
        • Create another organization
        • Know your Groups section
        • Manage a group's configuration
        • Register payment information
        • See the target of evaluation's status and SBOM
        • Sort groups into portfolios
        • Invite contributing developers
        • Manage members
        • Manage your organization's authors
        • Understand roles
        • Import repositories fast and safely with OAuth
        • Manage environments
        • Manage repositories
        • Manage your credentials
        • Resolve events impeding tests
        • See retrieved repositories not yet added to any group
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • CVSS score adjustment
        • Examine the evidence of exploitability
        • Find reachable dependency vulnerabilities
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Vulnerability signature update
        • Ask the AI Agent
        • Ask via chat
        • Post comments
        • Send Fluid Attacks an email
        • Talk to a Pentester
        • Watch certifiable tutorial videos or get a demo
        • Vulnerability reporting
        • Standard compliance
        • ZTNA logs
        • Recent downloads
        • Common analytics
        • Organization analytics
        • Group analytics
        • Portfolio analytics
        • Charts options
        • CI Gate configuration
        • CI Gate executions
        • Security gates
        • Vulnerability acceptance
        • Prioritization attributes
        • Explore the user menu
        • Enable and disable notifications
        • Subscribe to News
        • Leave a group
      • Manage repositories
      • See vulnerabilities
        • Fluid Attacks' scanners
        • OWASP Benchmark results
        • Your feedback
      • Use the scanners
        • Local run
        • CI/CD integration
        • Understanding outputs
        • Findings exclusion
      • Use a configuration file
        • SAST scanner
        • SCA scanner
        • DAST scanner
        • APK scanner
      • Automatic remediation
      • Custom remediation guides
      • Introduction to Sorts
      • Sorts user guide
      • Connection mechanisms
      • Cloud connection
      • Egress connection
      • Connector connection
      • Types of authentication
      • AWS CodeCommit
    • Service-level agreement
      • Availability SLA
      • Response SLA
      • Accuracy SLA
      • False negatives
      • False positives
      • Scope
    • Support information
      • Changelog
        • 2023
        • 2024
        • 2025
        • 2026
      • Roadmap
      • AI functions
      • Attack surfaces
      • Binaries
      • Browsers
      • CI/CD
      • Clouds
      • CVEs for reachability
      • Evidence formats
      • Frameworks
      • IDE functionalities
      • Languages
      • Languages for fixes
      • Package managers
      • Remediation
      • SCM systems
      • Secrets
      • Standards
      • Ticketing systems
      • Documentation sections
  • Integrations
      • Local tools
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
      • Install the VS Code extension
      • View vulnerable lines, use fix options and more
      • VS Code extension error and solution catalog
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
      • Excluding files from analysis
      • Integrate with Azure DevOps Peer Reviewer Assistant
      • Integrate with GitLab Peer Reviewer Assistant
      • Troubleshooting
      • Introduction
      • Use the API
      • Learn the basics of the Fluid Attacks API
      • Things to know before using the API
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • D3
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
    • Pentesting tools
  • Compliance
    • Authentication
      • Clients
      • Password policies
      • Staff
    • Authorization
      • Access revocation
      • Clients
      • Employee termination
      • Endpoints
      • Secret rotation
      • Sessions
      • Staff
    • Availability
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
    • Confidentiality
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
    • Integrity
      • Applicant evaluation
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Monitoring
      • Production data isolation
      • Secure emails
      • SLSA compliance
      • Standard timezone
      • Static website
      • Training plan
    • Non-repudiation
      • Everything as code
      • Extensive logs
    • Privacy
      • Data privacy policy
      • Data retention policy
      • Data use policy
      • Email obfuscation
      • Time tracking
      • Manual for the NDR
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Data transmission
      • Unsubscribe email
      • Use of cookies
    • Resilience
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
    • Transparency
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • ArmorCode
    • Arnica
    • Astra
    • Backslash
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security (GHAS)
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype Lifecycle
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 

On This Page

  • Prerequisites
  • MCP server in Claude
  • Install the runtime environment
  • Set up in Claude
  • Example in Claude
  • Remote MCP server in Cursor
  • Configuration
  • Example in Cursor
  • Remote MCP server in VS Code
  • Configuration
  • Share the server configuration with your team
  • Security considerations
  • Integrate our scanners into your SDLC using AI
  • Add AGENTS.md to your project using Fluid Attacks’ MCP server
  • Add AGENTS.md to your project manually
  • 1. Create the AGENTS.md file
  • 2. Add the AGENTS.md content
  • Troubleshooting
IntegrationsMCP serverInstallation

Installation

The Fluid Attacks MCP server, along with our entire suite of local tools and extensions , is available free of charge.

This guide explains how to install the local MCP server in Claude and use the remote MCP server in Cursor and VS Code. Besides, you can learn how to integrate Fluid Attacks security scanners into your software development lifecycle (SDLC) using AI agents.

Prerequisites

  • To use the Fluid Attacks MCP Server, you need an AI assistant that supports MCP, such as Claude (via Cursor, Claude Desktop, VS Code, etc.).
  • Do you want to access information about vulnerabilities? If so, you need a Fluid Attacks API token. This is optional for public tools.
  • Do you want to run security scans? If so, you need to have Docker installed . Also, it is recommended to configure an AGENTS.md file  in the project root directory.

Remember that using Fluid Attacks’ MCP server also consumes tokens from your AI assistant.

MCP server in Claude

See the requirements of the MCP server  on Claude.

Install the runtime environment

Follow these steps to install Node.js, which is required for using Fluid Attacks’ MCP server. If you already have Node.js v22 installed, simply skip to the next section according to your needs.

  1. It is recommended that you install Node Version Manager (nvm), as it allows you to have different versions of Node.js and switch between them according to your current needs. To install nvm, open your terminal and run the following:
curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.40.2/install.sh | bash

Close and reopen your terminal or run the following command to load nvm into your current session:

\. "$HOME/.nvm/nvm.sh"
  1. Install the Node.js version 22 with the following command (v18 or higher is required):
nvm install 22

Set up in Claude

Set up Fluid Attacks’ MCP server in Claude following these instructions:

  1. Go to the menu bar, click on Claude and then Settings.
Open Claude settings
  1. Switch to the Developer tab and click the Edit Config button.
Find Edit Config in Claude
  1. You are presented with a folder that contains the file claude_desktop_config.json. Open this file with a text editor.

  2. Paste the following into the configuration file, replacing <your_api_token_here> with the previously generated Fluid Attacks API token.

    { "mcpServers": { "fluidattacks-mcp": { "command": "npx", "args": [ "--cache", "/tmp/fluidattacks-mcp", "-y", "@fluidattacks/mcp" ], "env": { "API_TOKEN": "<your_api_token_here>" } } } }
  3. Save the file and close both it and Claude.

To interact with the platform, reopen Claude and start chatting! See an example below.

Example in Claude

The following example shows the generation of a vulnerability report for a specific group in a specific organization.

The prompt is the following:

Using Fluid Attacks’ API, please generate a one-page report of the vulnerabilities found in the Narrabri group of the Imamura organization.

Prompt Claude to use the Fluid Attacks platform

Claude asks for permission before using a tool by the MCP server. The following screenshot references the fetch_group_vulnerabilities tool, which accesses the group’s vulnerability information (such as vulnerability status and severity ).

Check out a description of each tool and capability .

Allow the Fluid Attacks tools on Claude

Claude then mentions the tools run and provides an outline of the report while generating the one-page document.

Generate a Fluid Attacks vulnerability report on Claude

Remote MCP server in Cursor

Do not forget to generate an API token  for the setup.

Configuration

Use Fluid Attacks’ remote MCP server in Cursor, following these instructions:

  1. Go to Cursor’s MCP Directory  and search for the Fluid Attacks server.
  2. Click on the Add to Cursor button:
Fluid Attacks server on Cursor MCP Directory
  1. Once you see this warning message in your browser, click the Open Link or Open Cursor.app button:
Open Cursor link
  1. Optional: Add the token generated from the Fluid Attacks platform. If you do not have a token, you can leave the default setting. Please note that the token is required to access information about your groups on the platform.
Installing Fluid Attacks MCP server on Cursor
  1. Click on the Install button.

  2. Verify that the server is active before using it to request vulnerability scans or reports containing information about your groups.

    fluidattacks-mcp is enabled for Cursor
  3. You can now use the Fluid Attacks MCP server in Cursor.

    Use Fluid Attacks MCP on Cursor

Example in Cursor

The following example shows the request for the vulnerability with the highest CVSS score in a specific file within a particular group in a specific organization.

The prompt used is the following:

From the Fluid Attacks API, what is the highest severity (CVSS) vulnerability in the basketitems.ts file of the Clickable group within the Imamura Organization?

Prompt Cursor to use the Fluid Attacks platform

Cursor asks for confirmation before running a tool by the MCP server. The following screenshot references the fetch_group_vulnerabilities tool, which retrieves vulnerability information (such as vulnerability status and severity ) from a specific file.

Read a description of each tool and capability .

Allow the Fluid Attacks tool on Cursor

Cursor then responds with the type of vulnerability’s name, as well as breaks down its CVSS score and informs of the lines of code where the vulnerability is present.

Query Cursor about findings by Fluid Attacks

Remote MCP server in VS Code

Do not forget to generate an API token  for the setup.

Configuration

Use Fluid Attacks’ remote MCP server in VS Code, following these instructions:

  1. Open VS Code’s search bar (cmd + P) and type ”> MCP: Open User Configuration”.

  2. Select the option shown in the image below:

    Start MCP configuration on VS Code
  3. Fluid Attacks the MCP Server in the servers section of the file:

    { "servers": { "fluidattacks-mcp": { "type": "http", "url": "https://app.fluidattacks.com/mcp/messages/", "headers": { "Authorization": "Bearer <paste_your_api_token_here>" } } } }
  4. Optional: Replace <paste_your_api_token_here> with your Fluid Attacks API token.

  5. Save the file.

  6. As shown in the image below, click on Start.

    Start using MCP on VS Code
  7. The number of tools and prompts should be shown.

  8. To enable the AI Agent to use our MCP tools, click on the Configure tools option.

    Enable the AI Agent on VS Code
  9. On the opened window, search for “fluidattacks-mcp”, enable the tools you want to use, and click the OK button:

    Selecting fluidattacks-mcp on VS Code
  10. You can now use the Fluid Attacks MCP server in VS Code.

    Using Fluid Attacks MCP on VS Code

Share the server configuration with your team

Requirements: (1) Have Node.js installed  and (2) create the environment variable called “FLUID_ATTACKS_API_TOKEN”.

You can keep the Fluid Attacks MCP server configuration in your code repository for your entire team to use. Simply add the following to your IDE configuration folder within your repository and have your team meet the above requirements:

{ "mcpServers": { "fluidattacks-mcp": { "command": "npx", "args": [ "--cache", "/tmp/fluidattacks-mcp", "-y", "@fluidattacks/mcp", "https://app.fluidattacks.com/mcp/messages/" ] } } }

With this option, the API token is not hard-coded; it remains an environment variable, allowing the MCP server configuration to be versioned without issues.

Security considerations

  • API token security: Store tokens securely, never commit to version control.
  • Data sensitivity: Be cautious when sharing vulnerability data.

Integrate our scanners into your SDLC using AI

When using AI-powered development tools, such as Cursor, GitHub Copilot, or similar AI coding assistants, you can configure them to automatically execute Fluid Attacks security scanners at appropriate points in your SDLC. This integration helps you ensure that security vulnerabilities are detected and addressed early.

Before integrating our security scanners with AI agents, ensure that you have Docker installed in your system, that Fluid Attacks’ MCP server is configured in your AI development environment, and that you have write access to your project directory for configuration files and scan results.

Add AGENTS.md to your project using Fluid Attacks’ MCP server

On the chat of your AI agent, start by typing /fluidattacks-mcp/ and then select the following command:

/fluidattacks-mcp/config_agents_md

Add AGENTS.md to your project manually

1. Create the AGENTS.md file

Add an AGENTS.md file to your project root directory. This file contains instructions that AI agents will follow to determine when and how to execute security scanners.

The AGENTS.md file should be placed at the root of your project:

your-project/ ├── AGENTS.md # Add this file ├── src/ ├── package.json └── ...

2. Add the AGENTS.md content

# Project Instructions ## Execute Security Scanners ### Execute SCA Scanner When: - New dependencies are added to the project - Dependencies are updated to new versions - Lock files are modified (e.g.,`package-lock.json`, `uv.lock`) - User explicitly requests a dependency security scan - Setting up a new project for the first time - Before deploying to production - Before pushing to the repository ### Execute SAST Scanner When: - Source code changes are made to application files - New features or modules are added - Security-sensitive code is modified (authentication, authorization) - User explicitly requests a code security scan - Before committing significant code changes - During code reviews - Before deploying to production - Before pushing to the repository ### Execute Both Scanners When: - A complete security audit is needed - Major project updates involving both code and dependencies - Pre-deployment security check - User requests a full security scan ## Prerequisites - Docker installed on the system - No Dockerfile creation needed - only download the Docker images - Write access to the project directory for configuration files and results ## Fluid Attacks Scanner ### Purpose Scan the project for vulnerabilities using the Fluid Attacks MCP tools. ### Step-by-Step Instructions #### 1. Use Fluid Attacks MCP tools to configure and run the scanner #### 2. Add the output file to .gitignore #### 3. Remediate vulnerabilities - Review the output file - If there are vulnerabilities, remediate them ## Best Practices for Agents ### 1. Configuration File Management - Always verify the correct paths for include/exclude before running - Adjust configuration based on project structure - Use `.gitignore` as a reference for exclude patterns - Store configuration files in the project root and add them to .gitignore - Add the output file (Fluid-Attacks-Results.csv) to .gitignore ## When to Run What | Scenario | Scanner | Priority | | ----------------------------- | ------- | -------- | | New dependency added | SCA | High | | Code changes in auth/security | SAST | Critical | | Weekly security audit | Both | Medium | | Pre-deployment check | Both | Critical | | Dependency version update | SCA | High | | New feature development | SAST | Medium | | Third-party library added | SCA | High | | API endpoint changes | SAST | High | ## Integration with Development Workflow - On Code Changes: Run SAST if source files modified - On Dependency Changes: Run SCA if dependency files modified - On User Request: Run appropriate scanner(s) - Help with remediation: Always create/update security reports - Re-scan: After fixes to verify remediation

Troubleshooting

If the scanners are not being executed automatically:

  • Verify that AGENTS.md exists in your project root
  • Ensure the Fluid Attacks MCP server is properly configured
  • Check that Docker is installed and running
  • Verify that the AI agent has read access to AGENTS.md
  • You can ask the AI agent to execute the scanners: “Run fluid attacks scanners.”
  • You can use Fluid Attacks prompts 

If the scanners report false positives:

  • Review the specific vulnerability details
  • Adjust scanner configuration if needed
  • Document acceptable exceptions in your project documentation
  • Consider reaching out to Fluid Attacks support for clarification
Last updated on February 24, 2026
MCP serverCapabilities and use cases

Fluid Attacks 2026. All rights reserved.