protonese3/Firebreak
Security MCP server that turns your AI into a penetration tester. 20 tools, 100 best practice guides, 47 vulnerability patterns. Connect to Claude, Cursor, or any MCP client.
<p align="center"> <br><br> <strong>The security MCP server that turns your AI into a penetration tester.</strong> <br> <p align="center"> <a href="#quick-start">Quick Start</a> · <a href="#how-it-works">How It Works</a> · <a href="#tool-reference">Tool Reference</a> · <a href="#contributing">Contributing</a> · <a href="#license">License</a> </p> <p align="center"> <a href="https://github.com/protonese3/Firebreak/actions"></a> <a href="https://github.com/protonese3/Firebreak/blob/master/LICENSE"></a> </p> </p>
---
Connect Firebreak to Claude, Cursor, or any MCP-compatible client. Then just ask:
You: "Is my app secure?"
Claude: [calls firebreak tools] Found 6 vulnerabilities. 1 high (CORS misconfiguration),
5 medium (missing security headers). Security score: B. Want me to fix them?No CLI to learn. No reports to read. The AI runs the scans, interprets the results, and walks you through the fixes.
---
AI-generated code ships with predictable vulnerabilities: inconsistent auth middleware, permissive RLS policies, IDOR on every endpoint, secrets in the JS bundle. Developers who use AI to build don't always know how to test what it builds.
Firebreak flips the problem. Instead of expecting developers to learn
Loading reviews...