by mobb-dev
Provides automatic security vulnerability remediation for code via a command‑line interface and an MCP server, leveraging findings from popular SAST tools such as Checkmarx, CodeQL, Fortify, and Snyk.
Bugsy offers developers a fast way to identify and automatically fix security vulnerabilities in their source code. It can either run a fresh SAST scan on a repository or consume an existing SAST report, then generate code patches and direct users to detailed fix reports on the Mobb platform.
npx mobbdev.
npx mobbdev scan --repo <repo‑url>npx mobbdev analyze --scan-file <report>.json --repo <repo‑url>npx mobbdev mcp and configure your AI assistant (e.g., Claude) to call the fix_vulnerabilities tool.analyze command with appropriate environment variables to integrate automated fixing into pipelines.Q: Do I need a Mobb account? A: Yes, an API key from Mobb is required for MCP server functionality and for generating fix reports.
Q: Which languages are supported? A: Bugsy works with any language for which the underlying SAST tools provide findings (e.g., Java, JavaScript, Python, etc.).
Q: Can I use Bugsy on private repositories? A: Private repo analysis is limited and only available for a short time in the community edition.
Q: What happens if no vulnerable files are changed? A: The MCP server will return a message indicating that no changed files were found.
Q: How do I set the API key?
A: Export it as an environment variable: export API_KEY=your_api_key_here before starting the MCP server.
Bugsy is a command-line interface (CLI) tool that provides automatic security vulnerability remediation for your code. It is the community edition version of Mobb, the first vendor-agnostic automated security vulnerability remediation tool. Bugsy is designed to help developers quickly identify and fix security vulnerabilities in their code.
Mobb is the first vendor-agnostic automatic security vulnerability remediation tool. It ingests SAST results from Checkmarx, CodeQL (GitHub Advanced Security), OpenText Fortify, and Snyk and produces code fixes for developers to review and commit to their code.
Bugsy has two modes - Scan (no SAST report needed) & Analyze (the user needs to provide a pre-generated SAST report from one of the supported SAST tools).
Scan
Analyze
This is a community edition version that only analyzes public GitHub repositories. Analyzing private repositories is allowed for a limited amount of time. Bugsy does not detect any vulnerabilities in your code, it uses findings detected by the SAST tools mentioned above.
You can simply run Bugsy from the command line, using npx:
npx mobbdev
This will show you Bugsy's usage help:
Bugsy - Trusted, Automatic Vulnerability Fixer 🕵️♂️
Usage:
mobbdev <command> [options]
Commands:
mobbdev scan Scan your code for vulnerabilities, get automated fixes right away.
mobbdev analyze Provide a vulnerability report and relevant code repository, get automated fixes right away.
Options:
-h, --help Show help [boolean]
Examples:
mobbdev scan -r https://github.com/WebGoat/WebGoat Scan an existing repository
Made with ❤️ by Mobb
To run a new SAST scan on a repo and get fixes, run the Bugsy Scan command. Example:
npx mobbdev scan --repo https://github.com/mobb-dev/simple-vulnerable-java-project
To get fixes for a pre-generated SAST report, run the Bugsy Analyze command. Example: npx mobbdev analyze --scan-file sast_results.json --repo https://github.com/mobb-dev/simple-vulnerable-java-project
Bugsy will automatically generate a fix for each supported vulnerability identified in the results, and refer the developer to review and commit the fixes to their code.
To see all the options Bugsy allows, use the Scan or Analyze commands with the -h option:
npx mobbdev scan -h
npx mobbdev analyze -h
Bugsy can also be used as an MCP server, allowing AI assistants like Claude to automatically scan and fix vulnerabilities in your code repositories.
API Key: You need a Mobb API key to use the MCP server functionality
API_KEY environment variable: export API_KEY=your_api_key_hereLocal Git Repository: The MCP server analyzes git repositories with uncommitted changes
Run mobb-mcp from command line:
npx mobbdev mcp
Add Mobb MCP to your Cursor MCP client configuration:
API_URL is only required if you are not using https://app.mobb.ai
{
"mcpServers": {
"mobb-mcp": {
"command": "npx",
"args": ["mobbdev", "mcp"],
"env": {
"API_KEY": "your_mobb_api_key_here",
"API_URL": "optional__your_mobb_api_url_here"
}
}
}
}
Once configured, you can use the MCP server through your AI assistant:
Ask Claude to scan for vulnerabilities:
run a scan with mobb-mcp
or
run fix-vulnerabilities mcp tool
The MCP server will:
fix_vulnerabilities: Scans the current code changes and returns fixes for potential vulnerabilities
path (string) - The path to the local git repositoryIf you utilize SAST scans as part of the CI/CD pipeline, Bugsy can be easiy added and provide immediate fix for every issue detected. Here is a simple example of a command line that will run Bugsy in your pipeline:
npx mobbdev analyze --ci --scan-file $SAST_RESULTS_FILENAME --repo $CI_PROJECT_URL --ref $CI_COMMIT_REF_NAME --api-key $MOBB_API_KEY
Install the dependencies and run the tests:
pnpm install
# or use npm run build:dev to watch for changes
pnpm run build
# or use npm test:watch to watch for changes
pnpm run test
If you're using VSCode, you can use the launch.json file to debug the code. Run the CLI tests configuration to continuously run and debug the tests.
If you need support using Bugsy or just want to share your thoughts and learn more, you are more than welcome to join our discord server
Please log in to share your review and rating for this MCP.
{
"mcpServers": {
"mobb-mcp": {
"command": "npx",
"args": [
"mobbdev",
"mcp"
],
"env": {
"API_KEY": "<YOUR_API_KEY>"
}
}
}
}claude mcp add mobb-mcp npx mobbdev mcpExplore related MCPs that share similar capabilities and solve comparable challenges
by chaitin
A self‑hosted web application firewall and reverse proxy that protects web applications from attacks and exploits by filtering, monitoring, and blocking malicious HTTP/S traffic.
by safedep
Provides enterprise‑grade open source software supply chain security by scanning source code, dependencies, containers and SBOMs, detecting vulnerabilities and malicious packages, and enforcing policy as code.
by semgrep
Offers an MCP server that lets LLMs, agents, and IDEs run Semgrep scans to detect security vulnerabilities in source code.
by PortSwigger
Enables Burp Suite to communicate with AI clients via the Model Context Protocol, providing an MCP server and bundled stdio proxy.
by cycodehq
Boost security in the development lifecycle via SAST, SCA, secrets, and IaC scanning.
by ChristophEnglisch
Provides AI‑powered administration of Keycloak users and realms through the Model Context Protocol, enabling automated creation, deletion, and listing of users and realms from MCP clients such as Claude Desktop.
by Spathodea-Network
Provides a Model Context Protocol server that enables querying and retrieving threat intelligence data from OpenCTI through a standardized interface.
by firstorderai
Provides seamless access to two‑factor authentication codes and passwords for AI agents, enabling automated login while maintaining security.
by vespo92
Manage OPNsense firewalls through conversational AI, providing network configuration, device discovery, DNS filtering, HAProxy setup, and backup/restore via simple commands.