JSPM

  • ESM via JSPM
  • ES Module Entrypoint
  • Export Map
  • Keywords
  • License
  • Repository URL
  • TypeScript Types
  • README
  • Created
  • Published
  • Downloads 85
  • Score
    100M100P100Q96028F
  • License MIT

Security scanning for the vibe coding era. MCP server + CLI that finds secrets, auth bugs, SQL injection, XSS, IDOR, and vulnerable deps — and opens fix PRs. Works in Cursor, Claude Code, and VS Code. Bring your own model (Anthropic, OpenAI, Gemini, Groq, Ollama).

Package Exports

  • ironward
  • ironward/cli
  • ironward/engines/ai-config
  • ironward/engines/behavior-analyzer
  • ironward/engines/claude-client
  • ironward/engines/code-rules
  • ironward/engines/concurrent
  • ironward/engines/confidence
  • ironward/engines/dedup
  • ironward/engines/dep-confusion
  • ironward/engines/dep-intel
  • ironward/engines/docker-rules
  • ironward/engines/exploit-generator
  • ironward/engines/fix-validator
  • ironward/engines/git-diff
  • ironward/engines/github-client
  • ironward/engines/github-rules
  • ironward/engines/idor-prefilter
  • ironward/engines/ignore
  • ironward/engines/infra-rules
  • ironward/engines/junit
  • ironward/engines/k8s-rules
  • ironward/engines/model-profiles
  • ironward/engines/ollama-client
  • ironward/engines/osv-client
  • ironward/engines/prompt-builder
  • ironward/engines/recorder
  • ironward/engines/reputation-scorer
  • ironward/engines/sarif
  • ironward/engines/scan-cache
  • ironward/engines/secret-engine
  • ironward/engines/sql-prefilter
  • ironward/engines/url-scanner
  • ironward/engines/webhook
  • ironward/engines/xss-prefilter
  • ironward/package.json
  • ironward/tools/fix-and-pr
  • ironward/tools/scan-auth
  • ironward/tools/scan-code
  • ironward/tools/scan-deps
  • ironward/tools/scan-docker
  • ironward/tools/scan-github
  • ironward/tools/scan-idor
  • ironward/tools/scan-infra
  • ironward/tools/scan-k8s
  • ironward/tools/scan-secrets
  • ironward/tools/scan-sqli
  • ironward/tools/scan-url
  • ironward/tools/scan-xss

Readme

Ironward

Security scanning for the vibe coding era.

npm tests vscode license downloads

An open-source MCP server, CLI, and GitHub Action that finds hardcoded secrets, auth bugs, SQL injection, XSS, IDOR, and vulnerable dependencies in your code — and opens a fix PR. Four of its tools work fully offline, no API key required.


Install

# Scan the current project — no install, no API key.
npx ironward scan .

That's it. Runs offline, streams findings, exits non-zero on criticals so CI fails.

Or install globally:

npm install -g ironward
ironward scan ./src

The 13 tools

Tool Runtime What it finds
scan_for_secrets Offline 665 pattern families — AWS, GCP, Azure, Stripe, PayPal, GitHub, OpenAI, Anthropic, Supabase, PlanetScale, Ethereum/Solana wallets, Firebase, + Shannon entropy
scan_code Offline 374 static rules across 27 categories — vibe-stack (Supabase RLS, Next.js, Prisma/Drizzle, tRPC, Clerk, Firebase, Stripe, React) + general injection/crypto/auth (Node, Python, Java, Go) + v3.0.0 additions: API security, cloud misconfiguration (AWS S3/IAM/RDS, GCS, Azure), WebSocket, GraphQL, rate-limiting, mobile (RN), logging hygiene, dep-security, secrets-mgmt. Each finding can carry a proof-of-concept exploit (PoC, CVSS, OWASP, CWE, fix) — pass --exploit (CLI) or withExploits:true (MCP).
scan_deps Offline + opt-in API OSV.dev CVEs · curated 86-entry malware DB with version-exact matching · typosquat (Levenshtein + combosquatting + homoglyph + scope-mimic, 200+ popular pkgs) · abandoned packages · license compliance. Opt-in: --behavior (install scripts + obfuscation in node_modules), --reputation (npm registry scoring 0-100, cached 24h), --transitive (lockfile dep graph → CVE attribution to direct dep), --confusion (scoped private packages on public npm). --full enables all four.
scan_url Offline Letter-graded web scan — headers, CORS, cookies, exposed .env / .git, source maps, admin panels, API docs, Supabase/Firebase keys, TLS expiry
scan_docker Offline Dockerfile + docker-compose — root user, privileged:true, sensitive host mounts, secrets in ENV/ARG, :latest tags, curl | sh, exposed SSH/DB ports
scan_k8s Offline Kubernetes manifests — privileged containers, hostNetwork, dangerous capabilities (SYS_ADMIN, ALL), missing resource limits, secrets in env literals, default service accounts
scan_infra Offline Terraform + CloudFormation — public S3, 0.0.0.0/0 security groups, publicly-accessible RDS, IAM * policies, unencrypted EBS, GCP allUsers ACLs, Azure open NSGs
scan_github Offline GitHub Actions — pull_request_target + checkout (PR arbitrary-code-execution), expression injection via ${{ github.event.* }} in run:, unpinned action versions, write-all permissions, artifact leaks
scan_auth_logic AI Backwards auth checks, missing ownership, privilege escalation, bypassable middleware, JWT alg:none acceptance, session fixation
scan_sqli AI SQL injection across JS/TS, Python, Go, Ruby, PHP, Java — string concat, template literals, ORM raw / $queryRawUnsafe
scan_xss AI DOM + server-side XSS — innerHTML, dangerouslySetInnerHTML, Vue v-html, Svelte {@html}, EJS unescaped, reflected Express/Koa responses
scan_idor AI Routes reading an ID from params without an owner check. Prisma/Mongoose mass-assignment via data: req.body
fix_and_pr AI Generates surgical multi-file patches with validation loop — re-scans the fix before opening the PR

Bring your own model. AI tools work with Anthropic, OpenAI, Gemini, Groq, or a fully-local Ollama install.


Demo

$ npx ironward scan ./src
Ironward — offline scan of ./src

── scan-secrets ──
src/config.js
  [CRITICAL] L14:1  AWS access key ID  (aws_access_key)
      AKIA***REDACTED***

── scan-code ──
src/api/upload.js
  [HIGH] L42:5  eval() call  (eval-call)
      why: eval executes arbitrary code — a direct RCE sink when fed user input.
      fix: Remove eval. Parse data explicitly (JSON.parse, Function constructors).

── scan-deps ──
2 vulnerabilities across 14 dependencies — 1 critical, 1 high, 0 medium.

[CRITICAL] lodash@4.17.15  GHSA-p6mc-m468-83gw  — fixed in 4.17.19
  Prototype pollution in lodash

Done in 412ms.  Exit 2.

Exit codes: 0 clean · 1 low/medium findings · 2 critical or high findings (fails CI).


ironward login — use AI-powered scanners

Offline tools are always on. To enable scan_auth_logic, scan_sqli, scan_xss, scan_idor, and fix_and_pr, pick a provider:

ironward login

Interactive picker:

Ironward — pick an AI provider.

  1. Anthropic   — Claude Opus/Sonnet — best reasoning
  2. OpenAI      — GPT-4o — great alternative
  3. Google      — Gemini 1.5 Pro — good for XSS/SQLi
  4. Groq        — Llama 3 — fastest, cheapest
  5. Ollama      — Local — free, private, no cloud
  6. Skip        — offline tools only

Choose a provider [1-6]:

Key is stored in ~/.ironward/config.json (chmod 600) and never leaves your machine.

ironward whoami     # show current provider + model
ironward logout     # remove saved config
ironward free       # list tools that work without any API key

Use in Cursor / Claude Code / VS Code

Cursor
// ~/.cursor/mcp.json
{
  "mcpServers": {
    "ironward": {
      "command": "npx",
      "args": ["-y", "ironward@latest"],
      "env": { "ANTHROPIC_API_KEY": "sk-ant-..." }
    }
  }
}
Claude Code
claude mcp add ironward -- npx -y ironward@latest
VS Code
// .vscode/mcp.json
{
  "servers": {
    "ironward": {
      "command": "npx",
      "args": ["-y", "ironward@latest"]
    }
  }
}

ANTHROPIC_API_KEY (or any other provider key) is only required for the AI tools. Offline tools work without it.


GitHub Action

Scan on every push and pull request. Inline PR annotations, job summary with full findings table, zero config.

# .github/workflows/security.yml
name: Security
on: [push, pull_request]

jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: rayentr/ironward/github-action@v1
        with:
          fail-on: critical

Full configuration and outputs in github-action/README.md.


CLI reference

Scanning
  ironward scan <path>              run every offline scanner (auto-detects IaC files)
  ironward scan-secrets <path>...   665 pattern families
  ironward scan-code <path>...      300 static analysis rules (15 categories)
  ironward scan-code <path> --exploit  attach a PoC exploit (CVSS, OWASP, CWE, fix) to each finding
  ironward scan-deps <path>...      OSV CVE + typosquat (4 modes) / 88-entry malware DB / license
  ironward scan-deps <path> --full     adds: behavior + reputation + transitive + dep-confusion

Team integrations (v2.4.0+):
  ironward config                       show current configuration (secrets redacted)
  ironward slack-setup --webhook URL    Block Kit alerts to a Slack channel
  ironward linear-setup --api-key KEY   auto-create Linear issues for critical/high findings
  ironward jira-setup                   same, but for Jira (REST v3 + ADF)
  ironward email-setup                  weekly/daily HTML digest via Resend
  ironward badge --update-readme        Shields.io security score badge in README
  ironward api-server                   REST endpoints (/api/findings, /api/score, /api/badge.svg, …)

Project + offline (v2.5.0+):
  ironward init                         scaffold .ironward.json from detected stack
  ironward doctor                       diagnose every part of the install (offline tools, AI, Ollama, integrations, hooks)
  ironward benchmark                    run the 73-case detection benchmark (58 positive + 15 negative fixtures)
  ironward scan . --offline             skip network-bound intel (reputation, dep-confusion fetches)
  ironward scan . --no-network          stricter — also skip OSV.dev. Pure local rules + bundled malware DB.

Local AI via Ollama:
  Install Ollama from ollama.com and `ollama pull deepseek-coder:6.7b` —
  the 5 AI tools (scan_auth_logic, scan_sqli, scan_xss, scan_idor, fix_and_pr)
  run fully offline with no API key. Per-model prompt tiers (opus/sonnet/haiku)
  adapt prompt length and JSON-strictness to the model's reliability.
  ironward scan-url <https-url>     security headers, TLS, exposed files
  ironward scan-docker <path>...    Dockerfile + docker-compose
  ironward scan-k8s <path>...       Kubernetes manifests
  ironward scan-infra <path>...     Terraform + CloudFormation
  ironward scan-github <path>...    GitHub Actions workflows

Provider
  ironward login                    pick AI provider (interactive)
  ironward logout / whoami / free

Misc
  ironward --version
  ironward --help

Output format
  --format json                     machine-readable output for CI
  --format text                     (default)

VS Code extension

Ironward ships a native VS Code extension — inline squiggles, scan on save, status bar count, and a one-click "suppress this finding" quick-fix. Bundled standalone — no CLI install needed.

# Marketplace
code --install-extension ironward.ironward

# Or from a local .vsix build
cd vscode-extension && npm install && npm run package
code --install-extension ironward-vscode.vsix

Settings: ironward.scanOnSave, ironward.minConfidence, ironward.enabledScanners. See the extension README for details.


SARIF + JUnit + webhooks

Ironward fits into the tools your team already uses.

# GitHub Security tab
ironward scan-secrets --format sarif . > results.sarif
# Then in GitHub Actions:
#   - uses: github/codeql-action/upload-sarif@v3
#     with: { sarif_file: results.sarif }

# Jenkins / CircleCI / GitLab / Azure DevOps test panels
ironward scan-code --format junit . > results.xml

# Slack (or any POST endpoint)
ironward scan-secrets . --webhook "$SLACK_WEBHOOK_URL"

The webhook payload auto-detects Slack (hooks.slack.com) and emits Block Kit with rich formatting; any other URL receives raw JSON.


Watch mode + git pre-commit hook

ironward watch — file watcher that re-scans on every save. Ctrl-C to stop.

ironward watch ./src
# 🛡  Ironward watching src — Ctrl-C to stop
# 14:32:07  src/api/auth.ts
#   [CRITICAL] L42  jwt-alg-none  conf=95

ironward install-hooks — installs a git pre-commit hook that blocks commits with critical/high findings. Respects core.hooksPath (husky, lefthook, …) and preserves existing hook content.

cd myproject
ironward install-hooks
# git commit now blocks on findings
# bypass once: git commit --no-verify
# remove entirely: ironward uninstall-hooks

Incremental scanning + .ironwardignore

Ironward caches per-file scan results at ~/.ironward/cache.json keyed by content hash. On re-scan, unchanged files are served from cache — typically 5–10× faster on warm runs.

Pre-commit hooks become instant:

# Only scan files about to be committed.
ironward scan-secrets --staged

# Or files changed relative to a branch.
ironward scan-secrets --since=main

# Bust the cache if you need a fresh run.
ironward scan-secrets --no-cache .

Exclude files via .ironwardignore (gitignore syntax):

# .ironwardignore
fixtures/synthetic-secrets/
generated/
*.test.ts

Ironward also honors your existing .gitignore.


What makes it different

  • Offline-first. Four of nine tools run with zero network (except OSV.dev for CVE lookups). Bring an API key only when you want AI reasoning for auth/SQLi/XSS/IDOR.
  • It fixes the bug, not just finds it. fix_and_pr generates multi-file patches and re-scans the fix before opening a PR.
  • Bring your own model. Anthropic, OpenAI, Gemini, Groq, Ollama. Your key stays local. No Ironward cloud.
  • Three-line install. No signup, no SSO handshake, no per-seat pricing.
  • Self-scanned. Ironward scans its own source on every commit — zero findings.

Contributing

PRs welcome. The codebase is small and well-tested:

git clone https://github.com/rayentr/ironward
cd ironward
npm install
npm test          # 166 tests, all offline, no API calls
npm run build
node dist/bin.js scan ./src

Good first issues:

Every new pattern/rule must ship with a test. The scanner must stay self-clean (node dist/bin.js scan ./src returns 0 findings).


License

MIT — free to use, fork, ship.


Built by @rayentr.
Star the repo if Ironward saved you from shipping a secret. ⭐