Loading...
Loading...
AI-first security scanning with Medusa. 3,000+ detection patterns covering AI/ML, agents, MCP, RAG, prompt injection, and traditional SAST vulnerabilities. Wraps Medusa CLI with SARIF/JSON parsing, structured finding output, OWASP mapping, and remediation guidance.
npx skill4agent add oimiragieo/agent-studio medusa-securityPython 3.10+
pip install medusa-securitypython -m medusa --version# Step 1: Verify installation
python -m medusa --version
# Step 2: Run scan
medusa scan . --format sarif --fail-on high
# Step 3: Parse output (use scripts/main.cjs)
node .claude/skills/medusa-security/scripts/main.cjs --mode full --target .
# Step 4: Review findings by severity
# CRITICAL → immediate fix required
# HIGH → fix before release
# MEDIUM → fix in next sprint
# LOW → track and addressmedusa scan . --format sarif --ai-onlymedusa scan . --format sarif --quick# MCP security only
medusa scan . --format sarif --scanners mcp-server,mcp-config
# Secrets only
medusa scan . --format sarif --scanners secrets,gitleaks,env
# AI context files only
medusa scan . --format sarif --scanners ai-context.claude/skills/medusa-security/scripts/| Script | Purpose |
|---|---|
| Parses SARIF v2.1.0 output |
| Parses Medusa JSON output |
| Formats findings with OWASP mapping |
| Orchestrates the full pipeline |
| Wraps Medusa CLI invocation |
| Deterministic report writer (no Glob recursion) |
# Full scan with structured output
node .claude/skills/medusa-security/scripts/main.cjs --mode full --target .
# AI-only scan
node .claude/skills/medusa-security/scripts/main.cjs --mode ai-only --target .
# Quick scan (git-changed files)
node .claude/skills/medusa-security/scripts/main.cjs --mode quick --target .Globnode .claude/skills/medusa-security/scripts/security-review.cjs/.claude/context/reports/security-review-medusa-scan-2026-02-17.md.claude/hooks/.claude/lib/.claude/skills/medusa-security/scripts/.claude/CLAUDE.md.claude/skills/medusa-security/**/*| Severity | Action | Timeline |
|---|---|---|
| CRITICAL | Immediate fix | Before any merge |
| HIGH | Fix before release | Same sprint |
| MEDIUM | Fix in next sprint | Next cycle |
| LOW | Track and address | Backlog |
| Agent | Usage |
|---|---|
| Primary consumer. Use for comprehensive security reviews. |
| Use for targeted vulnerability scanning with authorization. |
| Use AI-only scan as part of code review workflow. |
# GitHub Actions example
- name: Security Scan
run: |
pip install medusa-security
medusa scan . --format sarif --fail-on high -o reports/
- name: Upload SARIF
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: reports/medusa-results.sarifpatterns.jsonissues.mdrecordGotcha()const manager = require('.claude/lib/memory/memory-manager.cjs');
manager.recordGotcha({
text: 'False positive: medusa flags X pattern in Y context',
area: 'security-scanning',
});
manager.recordPattern({
text: 'Prompt injection found in CLAUDE.md context files',
area: 'ai-security',
});security-architectstatic-analysissemgrep-rule-creatorinsecure-defaultsvariant-analysis