AutoSec-MCP is a production-ready automation framework that connects Snyk vulnerability detection with n8n workflows and custom MCP (Machine-Controlled Process) servers. It empowers security and DevOps teams to detect, triage, and remediate vulnerabilities automatically — with safety, auditability, and flexibility built in.
Created and maintained by @SimardeepSingh-zsh, this toolkit is designed to be practical, extensible, and easy to adopt across teams of any size.
-
Automated Vulnerability Detection
Snyk scans your codebase and sends structured results to n8n. -
Workflow Orchestration
n8n parses results, filters by severity, and routes alerts to Slack, GitHub, Jira, or other tools. -
Controlled Remediation
MCP servers expose safe, scriptable actions (e.g., open issues, create PRs) that n8n can trigger automatically. -
Policy Enforcement
A built-in policy engine ensures only approved packages are auto-remediated.
git clone https://github.com/SimardeepSingh-zsh/AutoSec-MCP.git
cd AutoSec-MCP
cp examples/.env.example .env
# Fill in secrets in .env (GitHub token, Snyk token, Slack webhook, etc.)docker compose -f examples/docker-compose.yml --env-file .env up -d --buildThis starts:
- n8n workflow engine
- PostgreSQL database for n8n
- A sample MCP server with GitHub integration
- Open n8n at http://localhost:5678
- Import the following JSON files from
/workflows:snyk-to-n8n.json– handles incoming Snyk data, routes alerts, and triggers MCPmcp-driven-remediation.json– filters issues, applies policy, and initiates remediation
node scripts/snyk_scan_trigger.js --path . --minSeverity=highdocker compose up- Use the n8n editor to import both workflows
- Publish them to make them active
- Use the CLI script or GitHub Action to trigger a Snyk scan
- Post results to the n8n webhook
- Slack notification for findings
- GitHub issue creation for critical vulnerabilities
- Jira ticket creation
- Remediation webhook triggered for high-severity issues
- Run n8n behind HTTPS and authentication
- Host MCP server behind an API gateway with mTLS or token-based auth
- Use fine-grained GitHub tokens scoped to specific repos
- Integrate Snyk scans into your CI pipeline and post results to n8n
- Keep auto-remediation behind manual approval until trust is established
| Path | Purpose |
|---|---|
docs/ |
Setup guides and architecture explanations |
scripts/ |
CLI tools to trigger scans and remediation |
workflows/ |
Importable n8n workflow JSON files |
examples/ |
Docker Compose setup and sample MCP server |
.env.example |
Template for environment variables |
LICENSE |
MIT license for open use |
README.md |
This file — your guide to the repo |
Pull requests are welcome. If you’d like to add new workflows, integrations, or improvements, please check out CONTRIBUTING.md.
This project is licensed under the MIT License — see LICENSE for details.