MCP Server

SecDim Model Context Protocol (MCP) server provides secure coding education through personalised learning pathways based on vulnerabilities and developer profiles.

Features

  • 🔍 Vulnerability Search: Find labs for specific vulnerabilities

  • 🎯 Personalized Learning: Customized paths based on language and experience

  • 🐙 GitHub Integration: Analyzes profiles for languages and frameworks

  • 👤 SecDim Integration: Uses profile data to enhance recommendations

  • 🛡️ OWASP Top 10: Covers critical security vulnerabilities

SecDim MCP Server is a beta project that is currently in development. Provide your feedback, bug reports, and feature requests at SecDim Discuss.

How it works

Once you add SecDim MCP Server to any MCP-enabled tool, you can then ask:

  • Give me a personalised secure coding learning path in Python or

  • Give me a learning lab that is related to SQL Injection or

  • Give me practice labs that is related to the identified vulnerabilities in my code

You can use it to:

  • Integrate with popular tools and IDEs for secure coding practices.

  • Access hands-on secure coding labs for vulnerabilities like XSS, SQL Injection, and OWASP Top 10 topics.

  • Get a personalized learning pathway based on your GitHub or SecDim profile to accelerate your remediation skills.

  • Access curated resources and practice exercises tailored to your languages, frameworks, and experience level.

Prerequisites

There are no prerequisites. You can start using SecDim MCP Server immediately.

Getting started

SecDim MCP Server is remotely accessible on https://mcp.secdim.dev/mcp.

Simply add the following lines to your MCP tool:

{
  "mcpServers": {
    "secdim": {
        "type": "http",
        "url": "https://mcp.secdim.dev/mcp"
    }
  }
}

Tools

  • get_vulnerable_practice_labs: Search for secure coding labs for vulnerabilities.

  • get_learning_pathway: Get personalised learning pathways based on your experience.

Get a relevant vulnerable secure coding lab

Return a list of hands-on SecDim secure coding labs related to a detected or suspected vulnerability.

Use this tool to:

  • Find secure coding learning labs for specific vulnerabilities like XSS, SQL Injection, etc.

  • Explore OWASP Top 10 vulnerabilities and related labs

  • Provide additional resources and guides to help developers improve their secure coding skills

Get a personalized learning pathway

Return a personalized secure code learning pathway based on github or secdim profile context.

Use this tool to:

  • Analyse GitHub profile to understand developer’s experience and provide a personalized learning path

  • Analyse SecDim profile to understand developer’s experience and provide a personalized learning path

  • Provide important resources and link to secure code learning labs on how to fix specific vulnerabilities

  • Teach developer how to patch a specific vulnerability

  • Provide a series of hands-on labs to practice secure coding

  • Create a personalized learning path for secure coding practices

Guides

You can find specific guides for each tool in the left navigation bar: