New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

vibesec

Package Overview
Dependencies
Maintainers
1
Versions
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

vibesec

Security scanner for AI-generated code - detects vulnerabilities in vibe-coded projects

latest
Source
npmnpm
Version
0.1.0
Version published
Weekly downloads
0
Maintainers
1
Weekly downloads
 
Created
Source

VibeSec

Security Scanner for AI-Generated Code

Catches vulnerabilities your AI assistant missed. Integrates directly with Claude Code, Cursor, and Cline via MCP (Model Context Protocol).

License: MIT PRs Welcome

# 2-minute setup for Claude Code
echo '{"mcpServers":{"vibesec":{"command":"bun","args":["run","/path/to/vibesec-bun-poc/bin/vibesec-mcp"]}}}' > ~/.claude/mcp.json

# Restart Claude Code - that's it!

✨ New: AI Assistant Integration

VibeSec now works inside your AI coding assistant through MCP integration:

  • 🔍 Real-time scanning as Claude/Cursor generates code
  • 🤖 AI-aware detection for prompt injection, incomplete implementations, hallucinated APIs
  • Zero friction - works directly in your existing workflow
  • 🔒 100% local - your code never leaves your machine

Demo:

You: "Claude, can you scan this file for security issues using VibeSec?"
Claude: *uses vibesec_scan tool* "Found 2 critical issues:
  1. Hardcoded API key on line 23
  2. SQL injection risk in query builder..."

See it in action →

🎯 Why VibeSec?

The rise of vibe coding has democratized software development, but 45% of AI-generated code fails security tests (Veracode 2025). VibeSec bridges the gap between rapid AI-assisted development and production-ready security.

Key Problems We Solve

  • AI-Specific Vulnerabilities: Detects patterns unique to AI-generated code (incomplete implementations, placeholder TODOs, over-permissive configs)
  • Non-Technical Accessibility: Plain-language reports that PMs and designers can understand
  • Integration-First: Works alongside Snyk, Socket.dev, and your existing security tools
  • Always Up-to-Date: Auto-updating vulnerability database with latest AI-specific threats

🚀 Quick Start

For Developers

# Install via npm
npm install -g vibesec

# Or use with Bun (recommended for POC)
bun install vibesec

# Scan your project
vibesec scan .

# Get plain language help
vibesec scan --explain

# Generate stakeholder report
vibesec scan -f stakeholder -o report.txt

For Non-Technical Users (PMs, Designers, Product Owners)

VibeSec speaks your language! No security expertise needed.

# Scan with plain language explanations
vibesec scan . --explain

# What you'll see:
# ✅ Clear "What/Why/How" explanations (no jargon!)
# ✅ Real-world analogies (e.g., "like leaving your door unlocked")
# ✅ Time estimates for each fix (e.g., "15-30 minutes")
# ✅ Who can fix it (e.g., "Any developer")
# ✅ Security score out of 100

First time? Check out the Quick Start Guide for a step-by-step walkthrough.

📊 What VibeSec Detects

AI-Generated Code Patterns

  • ✅ Hardcoded secrets and API keys
  • ✅ Missing input validation (SQL injection, XSS)
  • ✅ Insecure authentication patterns
  • ✅ TODO/placeholder security features
  • ✅ Generic error handlers exposing sensitive info
  • ✅ Over-permissive CORS and permissions
  • ✅ Prompt injection vulnerabilities
  • ✅ Data exfiltration risks

Language Support

  • JavaScript/TypeScript ✅
  • Python (coming soon)
  • Go (coming soon)
  • Java (coming soon)
  • Ruby (coming soon)
  • PHP (coming soon)

Note: POC currently focuses on JavaScript/TypeScript. Built with TypeScript + Bun runtime. See TECH_STACK.md for details.

🏗️ Architecture

┌─────────────────────────────────────────────────────────┐
│                     VibeSec CLI                         │
└─────────────────────────────────────────────────────────┘
                            │
        ┌───────────────────┼───────────────────┐
        ▼                   ▼                   ▼
┌───────────────┐   ┌───────────────┐   ┌──────────────────┐
│ Core Scanner  │   │ Integrations  │   │  Reporters       │
│               │   │               │   │                  │
│ • AST Parser  │   │ • Snyk API    │   │ • Plain Text     │
│ • Detectors   │   │ • Socket.dev  │   │ • JSON           │
│ • Analyzers   │   │ • GitHub      │   │ • Plain Language │
│               │   │               │   │ • Stakeholder    │
└───────────────┘   └───────────────┘   └──────────────────┘
        │
        ▼
┌─────────────────────────────────────────────────────────┐
│              Detection Rules Database                   │
│  • Built-in Rules  • Community Rules  • Custom Rules   │
└─────────────────────────────────────────────────────────┘

See ARCHITECTURE.md for detailed design documentation.

🔧 Configuration

Create a .vibesec.yaml file in your project root:

# .vibesec.yaml
version: 1

scan:
  paths:
    - src/
    - lib/
  exclude:
    - node_modules/
    - vendor/
    - "*.test.js"

severity:
  fail_on: high  # fail CI if high/critical issues found

detectors:
  secrets: true
  injection: true
  auth: true
  ai-specific: true

integrations:
  snyk:
    enabled: true
    token: ${SNYK_TOKEN}
  socket:
    enabled: true
    token: ${SOCKET_TOKEN}

output:
  format: json
  file: vibesec-report.json

📖 Documentation

📚 Complete Documentation Index - Browse all documentation

Getting Started

Core Documentation

Additional Resources

🤝 Integrations

Current

  • ✅ GitHub Actions
  • ✅ Snyk (dependency vulnerabilities)
  • ✅ Socket.dev (supply chain security)

Roadmap

  • ⏳ GitLab CI/CD
  • ⏳ CircleCI
  • ⏳ Jenkins
  • ⏳ Slack notifications
  • ⏳ Discord webhooks
  • ⏳ JIRA integration

🎯 Roadmap

📋 Active Planning: GitHub Project Board

POC (Weeks 1-2) ✅ COMPLETE

  • Core scanner engine with 19 security rules
  • Multi-detector system (secrets, injection, auth, incomplete code, AI-specific)
  • CLI tool with progress indicators
  • Plain-language and stakeholder reporters
  • Security scorecard (0-100 grading)
  • Comprehensive test suite (67 tests, 82% coverage)
  • User testing materials and feedback forms

MVP (Weeks 3-8) 🚧 IN PROGRESS

Track progress on our GitHub Project:

  • Enhanced Scanner (Tree-sitter AST, incremental scanning)
  • AI-Specific Detection Engine (confidence scoring, heuristics)
  • Integration Layer (Snyk, Socket.dev, GitHub Actions)
  • Reporting & UX (HTML/Markdown reports, auto-fix suggestions)
  • Web Dashboard (optional, React + Express + SQLite)
  • Polish & Launch (docs, examples, beta testing)

Post-MVP 🔮

  • IDE Integrations (VS Code, JetBrains)
  • Language Expansion (Ruby, PHP, Java, C#, Swift)
  • AI Chatbot ("Ask VibeSec")
  • Machine Learning for detection
  • Community rule marketplace
  • Enterprise features (SSO, audit logs, white-label)

Planning docs migrated to GitHub Projects for better collaboration. See docs/archive/ for historical planning documents.

🧪 Testing

# Run all tests
npm test

# Run specific test suite
npm test -- scanner/detectors/secrets

# Run with coverage
npm test -- --coverage

📝 Examples

Basic Scan

# Scan current directory
vibesec scan .

# Scan with plain language (for PMs/designers)
vibesec scan --explain

# Only show critical issues
vibesec scan --severity critical

# Generate stakeholder report for board presentation
vibesec scan -f stakeholder -o security-report.txt

Using Security Scorecard

# Get security score (0-100) with benchmark comparison
vibesec scan --explain

# Output shows:
# Security Score:
#   85/100 (B) - Good
#   Your score is 5 points above the average for small projects

Accessibility Features

# Disable colors (for screen readers or terminals without color support)
vibesec scan --no-color

# Or use environment variable
NO_COLOR=1 vibesec scan .

CI/CD Integration

# .github/workflows/vibesec.yml
name: VibeSec Security Scan
on: [push, pull_request]

jobs:
  security:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3
      - name: Install Bun
        uses: oven-sh/setup-bun@v1
      - name: Install VibeSec
        run: bun install vibesec
      - name: Run Security Scan
        run: bun vibesec scan . --severity high -f json

See examples/ for more use cases.

🌍 Community

📜 License

VibeSec is open-source software licensed under the MIT License.

🙏 Acknowledgments

VibeSec is built on research from:

  • Veracode's 2025 GenAI Code Security Report
  • NYU/Stanford AI-assisted coding security research
  • OWASP AI Security & Privacy Guide
  • Community contributions from vibe coders worldwide

🚨 Security Issues

If you discover a security vulnerability within VibeSec itself, please email security@vibesec.dev. All security vulnerabilities will be promptly addressed.

Built with ❤️ for the vibe coding community

Keywords

security

FAQs

Package last updated on 23 Oct 2025

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts