ironward
v3.2.0
Published
Security scanning for the vibe coding era. MCP server + CLI that finds secrets, auth bugs, SQL injection, XSS, IDOR, and vulnerable deps — and opens fix PRs. Works in Cursor, Claude Code, and VS Code. Bring your own model (Anthropic, OpenAI, Gemini, Groq,
Maintainers
Readme
Install
# Scan the current project — no install, no API key.
npx ironward scan .That's it. Runs offline, streams findings, exits non-zero on criticals so CI fails.
Or install globally:
npm install -g ironward
ironward scan ./srcThe 13 tools
| Tool | Runtime | What it finds |
|------|---------|---------------|
| scan_for_secrets | Offline | 665 pattern families — AWS, GCP, Azure, Stripe, PayPal, GitHub, OpenAI, Anthropic, Supabase, PlanetScale, Ethereum/Solana wallets, Firebase, + Shannon entropy |
| scan_code | Offline | 374 static rules across 27 categories — vibe-stack (Supabase RLS, Next.js, Prisma/Drizzle, tRPC, Clerk, Firebase, Stripe, React) + general injection/crypto/auth (Node, Python, Java, Go) + v3.0.0 additions: API security, cloud misconfiguration (AWS S3/IAM/RDS, GCS, Azure), WebSocket, GraphQL, rate-limiting, mobile (RN), logging hygiene, dep-security, secrets-mgmt. Each finding can carry a proof-of-concept exploit (PoC, CVSS, OWASP, CWE, fix) — pass --exploit (CLI) or withExploits:true (MCP). |
| scan_deps | Offline + opt-in API | OSV.dev CVEs · curated 86-entry malware DB with version-exact matching · typosquat (Levenshtein + combosquatting + homoglyph + scope-mimic, 200+ popular pkgs) · abandoned packages · license compliance. Opt-in: --behavior (install scripts + obfuscation in node_modules), --reputation (npm registry scoring 0-100, cached 24h), --transitive (lockfile dep graph → CVE attribution to direct dep), --confusion (scoped private packages on public npm). --full enables all four. |
| scan_url | Offline | Letter-graded web scan — headers, CORS, cookies, exposed .env / .git, source maps, admin panels, API docs, Supabase/Firebase keys, TLS expiry |
| scan_docker | Offline | Dockerfile + docker-compose — root user, privileged:true, sensitive host mounts, secrets in ENV/ARG, :latest tags, curl \| sh, exposed SSH/DB ports |
| scan_k8s | Offline | Kubernetes manifests — privileged containers, hostNetwork, dangerous capabilities (SYS_ADMIN, ALL), missing resource limits, secrets in env literals, default service accounts |
| scan_infra | Offline | Terraform + CloudFormation — public S3, 0.0.0.0/0 security groups, publicly-accessible RDS, IAM * policies, unencrypted EBS, GCP allUsers ACLs, Azure open NSGs |
| scan_github | Offline | GitHub Actions — pull_request_target + checkout (PR arbitrary-code-execution), expression injection via ${{ github.event.* }} in run:, unpinned action versions, write-all permissions, artifact leaks |
| scan_auth_logic | AI | Backwards auth checks, missing ownership, privilege escalation, bypassable middleware, JWT alg:none acceptance, session fixation |
| scan_sqli | AI | SQL injection across JS/TS, Python, Go, Ruby, PHP, Java — string concat, template literals, ORM raw / $queryRawUnsafe |
| scan_xss | AI | DOM + server-side XSS — innerHTML, dangerouslySetInnerHTML, Vue v-html, Svelte {@html}, EJS unescaped, reflected Express/Koa responses |
| scan_idor | AI | Routes reading an ID from params without an owner check. Prisma/Mongoose mass-assignment via data: req.body |
| fix_and_pr | AI | Generates surgical multi-file patches with validation loop — re-scans the fix before opening the PR |
Bring your own model. AI tools work with Anthropic, OpenAI, Gemini, Groq, or a fully-local Ollama install.
Demo
$ npx ironward scan ./src
Ironward — offline scan of ./src
── scan-secrets ──
src/config.js
[CRITICAL] L14:1 AWS access key ID (aws_access_key)
AKIA***REDACTED***
── scan-code ──
src/api/upload.js
[HIGH] L42:5 eval() call (eval-call)
why: eval executes arbitrary code — a direct RCE sink when fed user input.
fix: Remove eval. Parse data explicitly (JSON.parse, Function constructors).
── scan-deps ──
2 vulnerabilities across 14 dependencies — 1 critical, 1 high, 0 medium.
[CRITICAL] [email protected] GHSA-p6mc-m468-83gw — fixed in 4.17.19
Prototype pollution in lodash
Done in 412ms. Exit 2.Exit codes: 0 clean · 1 low/medium findings · 2 critical or high findings (fails CI).
ironward login — use AI-powered scanners
Offline tools are always on. To enable scan_auth_logic, scan_sqli, scan_xss, scan_idor, and fix_and_pr, pick a provider:
ironward loginInteractive picker:
Ironward — pick an AI provider.
1. Anthropic — Claude Opus/Sonnet — best reasoning
2. OpenAI — GPT-4o — great alternative
3. Google — Gemini 1.5 Pro — good for XSS/SQLi
4. Groq — Llama 3 — fastest, cheapest
5. Ollama — Local — free, private, no cloud
6. Skip — offline tools only
Choose a provider [1-6]:Key is stored in ~/.ironward/config.json (chmod 600) and never leaves your machine.
ironward whoami # show current provider + model
ironward logout # remove saved config
ironward free # list tools that work without any API keyUse in Cursor / Claude Code / VS Code
// ~/.cursor/mcp.json
{
"mcpServers": {
"ironward": {
"command": "npx",
"args": ["-y", "ironward@latest"],
"env": { "ANTHROPIC_API_KEY": "sk-ant-..." }
}
}
}claude mcp add ironward -- npx -y ironward@latest// .vscode/mcp.json
{
"servers": {
"ironward": {
"command": "npx",
"args": ["-y", "ironward@latest"]
}
}
}ANTHROPIC_API_KEY (or any other provider key) is only required for the AI tools. Offline tools work without it.
GitHub Action
Scan on every push and pull request. Inline PR annotations, job summary with full findings table, zero config.
# .github/workflows/security.yml
name: Security
on: [push, pull_request]
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: rayentr/ironward/github-action@v1
with:
fail-on: criticalFull configuration and outputs in github-action/README.md.
CLI reference
Scanning
ironward scan <path> run every offline scanner (auto-detects IaC files)
ironward scan-secrets <path>... 665 pattern families
ironward scan-code <path>... 300 static analysis rules (15 categories)
ironward scan-code <path> --exploit attach a PoC exploit (CVSS, OWASP, CWE, fix) to each finding
ironward scan-deps <path>... OSV CVE + typosquat (4 modes) / 88-entry malware DB / license
ironward scan-deps <path> --full adds: behavior + reputation + transitive + dep-confusion
Team integrations (v2.4.0+):
ironward config show current configuration (secrets redacted)
ironward slack-setup --webhook URL Block Kit alerts to a Slack channel
ironward linear-setup --api-key KEY auto-create Linear issues for critical/high findings
ironward jira-setup same, but for Jira (REST v3 + ADF)
ironward email-setup weekly/daily HTML digest via Resend
ironward badge --update-readme Shields.io security score badge in README
ironward api-server REST endpoints (/api/findings, /api/score, /api/badge.svg, …)
Project + offline (v2.5.0+):
ironward init scaffold .ironward.json from detected stack
ironward doctor diagnose every part of the install (offline tools, AI, Ollama, integrations, hooks)
ironward benchmark run the 73-case detection benchmark (58 positive + 15 negative fixtures)
ironward scan . --offline skip network-bound intel (reputation, dep-confusion fetches)
ironward scan . --no-network stricter — also skip OSV.dev. Pure local rules + bundled malware DB.
Local AI via Ollama:
Install Ollama from ollama.com and `ollama pull deepseek-coder:6.7b` —
the 5 AI tools (scan_auth_logic, scan_sqli, scan_xss, scan_idor, fix_and_pr)
run fully offline with no API key. Per-model prompt tiers (opus/sonnet/haiku)
adapt prompt length and JSON-strictness to the model's reliability.
ironward scan-url <https-url> security headers, TLS, exposed files
ironward scan-docker <path>... Dockerfile + docker-compose
ironward scan-k8s <path>... Kubernetes manifests
ironward scan-infra <path>... Terraform + CloudFormation
ironward scan-github <path>... GitHub Actions workflows
Provider
ironward login pick AI provider (interactive)
ironward logout / whoami / free
Misc
ironward --version
ironward --help
Output format
--format json machine-readable output for CI
--format text (default)VS Code extension
Ironward ships a native VS Code extension — inline squiggles, scan on save, status bar count, and a one-click "suppress this finding" quick-fix. Bundled standalone — no CLI install needed.
# Marketplace
code --install-extension ironward.ironward
# Or from a local .vsix build
cd vscode-extension && npm install && npm run package
code --install-extension ironward-vscode.vsixSettings: ironward.scanOnSave, ironward.minConfidence, ironward.enabledScanners. See the extension README for details.
SARIF + JUnit + webhooks
Ironward fits into the tools your team already uses.
# GitHub Security tab
ironward scan-secrets --format sarif . > results.sarif
# Then in GitHub Actions:
# - uses: github/codeql-action/upload-sarif@v3
# with: { sarif_file: results.sarif }
# Jenkins / CircleCI / GitLab / Azure DevOps test panels
ironward scan-code --format junit . > results.xml
# Slack (or any POST endpoint)
ironward scan-secrets . --webhook "$SLACK_WEBHOOK_URL"The webhook payload auto-detects Slack (hooks.slack.com) and emits Block Kit with rich formatting; any other URL receives raw JSON.
Watch mode + git pre-commit hook
ironward watch — file watcher that re-scans on every save. Ctrl-C to stop.
ironward watch ./src
# 🛡 Ironward watching src — Ctrl-C to stop
# 14:32:07 src/api/auth.ts
# [CRITICAL] L42 jwt-alg-none conf=95ironward install-hooks — installs a git pre-commit hook that blocks commits with critical/high findings. Respects core.hooksPath (husky, lefthook, …) and preserves existing hook content.
cd myproject
ironward install-hooks
# git commit now blocks on findings
# bypass once: git commit --no-verify
# remove entirely: ironward uninstall-hooksIncremental scanning + .ironwardignore
Ironward caches per-file scan results at ~/.ironward/cache.json keyed by content hash. On re-scan, unchanged files are served from cache — typically 5–10× faster on warm runs.
Pre-commit hooks become instant:
# Only scan files about to be committed.
ironward scan-secrets --staged
# Or files changed relative to a branch.
ironward scan-secrets --since=main
# Bust the cache if you need a fresh run.
ironward scan-secrets --no-cache .Exclude files via .ironwardignore (gitignore syntax):
# .ironwardignore
fixtures/synthetic-secrets/
generated/
*.test.tsIronward also honors your existing .gitignore.
What makes it different
- Offline-first. Four of nine tools run with zero network (except OSV.dev for CVE lookups). Bring an API key only when you want AI reasoning for auth/SQLi/XSS/IDOR.
- It fixes the bug, not just finds it.
fix_and_prgenerates multi-file patches and re-scans the fix before opening a PR. - Bring your own model. Anthropic, OpenAI, Gemini, Groq, Ollama. Your key stays local. No Ironward cloud.
- Three-line install. No signup, no SSO handshake, no per-seat pricing.
- Self-scanned. Ironward scans its own source on every commit — zero findings.
Contributing
PRs welcome. The codebase is small and well-tested:
git clone https://github.com/rayentr/ironward
cd ironward
npm install
npm test # 166 tests, all offline, no API calls
npm run build
node dist/bin.js scan ./srcGood first issues:
- Add a new secret-pattern family — edit
patterns/secrets.jsonand add a fixture totests/fixtures/categories/. - Add a static-analysis rule — edit the matching file in
src/rules/(e.g.supabase.ts,nextjs.ts,prisma.ts,nodejs.ts) and it gets picked up bysrc/engines/code-rules.tsautomatically. - Teach
scan_urla new probe —src/engines/url-scanner.ts.
Every new pattern/rule must ship with a test. The scanner must stay self-clean (node dist/bin.js scan ./src returns 0 findings).
License
MIT — free to use, fork, ship.
