Support AI Assistant MCP Server MCP Server SecDim Model Context Protocol (MCP) server provides secure coding education through personalised learning pathways based on vulnerabilities and developer profiles. Your browser does not support the video tag. Features 🔍 Vulnerability Search: Find labs for specific vulnerabilities 🎯 Personalized Learning: Customized paths based on language and experience 🐙 GitHub Integration: Analyzes profiles for languages and frameworks 👤 SecDim Integration: Uses profile data to enhance recommendations 🛡️ OWASP Top 10: Covers critical security vulnerabilities SecDim MCP Server is a beta project that is currently in development. Provide your feedback, bug reports, and feature requests at SecDim Discuss. How it works Once you add SecDim MCP Server to any MCP-enabled tool, you can then ask: Give me a personalised secure coding learning path in Python or Give me a learning lab that is related to SQL Injection or Give me practice labs that is related to the identified vulnerabilities in my code You can use it to: Integrate with popular tools and IDEs for secure coding practices. Access hands-on secure coding labs for vulnerabilities like XSS, SQL Injection, and OWASP Top 10 topics. Get a personalized learning pathway based on your GitHub or SecDim profile to accelerate your remediation skills. Access curated resources and practice exercises tailored to your languages, frameworks, and experience level. Prerequisites There are no prerequisites. You can start using SecDim MCP Server immediately. Getting started SecDim MCP Server is remotely accessible on https://mcp.secdim.dev/mcp. Simply add the following lines to your MCP tool: { "mcpServers": { "secdim": { "type": "http", "url": "https://mcp.secdim.dev/mcp" } } } Tools get_vulnerable_practice_labs: Search for secure coding labs for vulnerabilities. get_learning_pathway: Get personalised learning pathways based on your experience. Get a relevant vulnerable secure coding lab Return a list of hands-on SecDim secure coding labs related to a detected or suspected vulnerability. Use this tool to: Find secure coding learning labs for specific vulnerabilities like XSS, SQL Injection, etc. Explore OWASP Top 10 vulnerabilities and related labs Provide additional resources and guides to help developers improve their secure coding skills Get a personalized learning pathway Return a personalized secure code learning pathway based on github or secdim profile context. Use this tool to: Analyse GitHub profile to understand developer’s experience and provide a personalized learning path Analyse SecDim profile to understand developer’s experience and provide a personalized learning path Provide important resources and link to secure code learning labs on how to fix specific vulnerabilities Teach developer how to patch a specific vulnerability Provide a series of hands-on labs to practice secure coding Create a personalized learning path for secure coding practices Guides You can find specific guides for each tool in the left navigation bar: ChatGPT Claude Command Line Copilot Chat Cursor Eclipse JetBrains IDEs Obsidian VS Code Xcode Zed