
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
@fastmcp-me/aibolit-mcp-server
Advanced tools
If you use AI agents, such as Claude Code, Cursor, or Windsurf, for code refactoring, you may enjoy using this MCP server. Your AI agent, when you ask it to "make code better," may wonder what exactly needs to be improved. Sadly, it may often overlook important problems. AI agents, by design, pay more attention to cosmetic issues, which are "low-hanging fruits" for them. This MCP server will give your agent a hint: what is the most critical design issue in the code. Then, the agent will refactor it and fix the issue.
First, install Node, Npm, Python, Pip, and aibolit:
aibolit --version
Then, add this MCP server to Claude Code
(or simply edit ~/claude.json, but it's not recommended):
claude mcp add aibolit npx aibolit-mcp-server@0.0.6
Then, restart Claude Code and ask it something along these lines: "Find the most critical design issue in my code base and fix it."
To test this project, simply run the following commands (you'll need Node 18+, Npm, and GNU make installed):
npm install
make
If everything builds correctly after your changes, submit a pull request.
FAQs
MCP Server for Aibolit
We found that @fastmcp-me/aibolit-mcp-server demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.