MCPSERV.CLUB
mobb-dev

Mobb MCP Server

MCP Server

AI-powered vulnerability scanning and auto-fixing for code repositories

Active(100)
59stars
1views
Updated 14 days ago

About

The Mobb MCP Server enables AI assistants to scan local Git repositories, detect security vulnerabilities using SAST data, and generate automated code fixes for developers to review and commit.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

Bugsy in Action

Bugsy is a lightweight command‑line interface that brings automated security remediation to any codebase. It bridges the gap between static application security testing (SAST) tools and developers by automatically converting identified vulnerabilities into concrete code patches. By doing so, it turns the tedious process of manual fix generation into a single, repeatable command that can be integrated into continuous integration pipelines or run locally by developers.

The tool operates in two complementary modes. In Scan mode, Bugsy invokes supported SAST engines such as Checkmarx or Snyk directly against a public GitHub, GitLab, or Azure DevOps repository. It then parses the generated report, filters for issues that can be remediated automatically, and produces a set of pull‑request‑ready patches. In Analyze mode, users supply an existing vulnerability report from Checkmarx, CodeQL, Fortify, or Snyk; Bugsy processes the file in the same way, generating fixes that can be reviewed and merged. This duality allows teams to choose between an end‑to‑end automated workflow or a more controlled, report‑driven approach.

For developers working with AI assistants, Bugsy’s MCP server capability is a game‑changer. By exposing its scan and analyze functions as Model Context Protocol endpoints, Claude or other assistants can trigger vulnerability scans on the fly, receive a list of suggested patches, and even propose pull requests—all within the assistant’s conversational interface. This tight integration removes friction between security tooling and developer workflows, enabling instant remediation suggestions without leaving the chat environment.

Key features that make Bugsy valuable include:

  • Vendor‑agnostic: Supports multiple SAST tools, so teams can keep their existing security stack while adding automated fixes.
  • Automatic patch generation: Converts findings into actionable code changes, dramatically reducing the time from detection to resolution.
  • MCP compatibility: Exposes its functionality as a server that AI assistants can call, opening up new possibilities for intelligent code review and continuous improvement.
  • CLI simplicity: One‑line commands ( or ) make it easy to drop into any workflow, from local development to CI pipelines.

Real‑world scenarios where Bugsy shines include continuous integration environments that need rapid feedback on new commits, security teams that want to surface fixes without manual triage, and AI‑augmented development workflows where an assistant can suggest patches in real time. By automating the most repetitive part of vulnerability remediation, Bugsy frees developers to focus on higher‑level design and business logic, while ensuring that security gaps are addressed before they reach production.