SkillAgentSearch skills...

Ggmcp

MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.

Install / Use

/learn @GitGuardian/Ggmcp
About this skill

Quality Score

0/100

Supported Platforms

Claude Code
Cursor

README

GitGuardian MCP Server

Stay focused on building your product while your AI assistant handles the security heavy lifting with GitGuardian's comprehensive protection.

This MCP server enables your AI agent to scan projects using GitGuardian's industry-leading API, featuring over 500 secret detectors to prevent credential leaks before they reach public repositories.

Resolve security incidents without context switching to the GitGuardian console. Take advantage of rich contextual data to enhance your agent's remediation capabilities, enabling rapid resolution and automated removal of hardcoded secrets.

Disclaimer

[!CAUTION] MCP servers are an emerging and rapidly evolving technology. While they can significantly boost productivity and improve the developer experience, their use with various agents and models should always be supervised.

Agents act on your behalf and under your responsibility. Always use MCP servers from trusted sources (just as you would with any dependency), and carefully review agent actions when they interact with MCP server tools.

To better assist you in safely using this server, we have:

(1) Designed our MCP server to operate with "read-only" permissions, minimizing the access level granted to your agent. This helps ensure that, even if the agent tries to perform unintended actions, its capabilities remain limited to safe, non-destructive operations.

(2) Released this official MCP server to ensure you are using a legitimate and trusted implementation.

Features supported

  • Secret Scanning: Scan code for leaked secrets, credentials, and API keys
  • Incident Management: View security incidents related to the project you are currently working.
  • Honeytokens: Create honeytokens to detect unauthorized access
  • Authentication Management: Get authenticated user information and token details
  • Token Management: Revoke current API tokens

Want more features? Have a use case that's not covered? We'd love to hear from you! Submit your ideas and feedback by opening an issue on GitHub to help us prioritize new MCP server capabilities.

Prompts examples

Remediate all incidents related to my project

Scan this codebase for any leaked secrets or credentials

Check if there are any new security incidents assigned to me

Help me understand this security incident and provide remediation steps

List all my active honeytokens

Generate a new honeytoken for monitoring AWS credential access

Show me my most recent honeytoken and help me embed it in my codebase

Create a honeytoken named 'dev-database' and hide it in config files

Prerequisites

Before installing the GitGuardian MCP servers, ensure you have the following prerequisites:

  • uv: This project uses uv for package installation and dependency management. Install uv by following the instructions at: https://docs.astral.sh/uv/getting-started/installation/

Installation

Below are instructions for installing the GitGuardian MCP servers with various AI editors and interfaces.

The MCP server supports both GitGuardian SaaS and self-hosted instances.

Installation with Cursor

Quick Install with One-Click Buttons (Cursor >= 1.0):

For Developer MCP Server:

Install Developer MCP Server

Note: The one-click install sets up the default US SaaS configuration. For EU SaaS or self-hosted instances, you'll need to manually add environment variables as shown in the Configuration section.

Manual Configuration:

  1. Edit your Cursor MCP configuration file located at ~/.cursor/mcp.json

  2. Add the GitGuardian MCP server configuration:

    {
      "mcpServers": {
        "GitGuardianDeveloper": {
          "command": "uvx",
          "args": [
            "--from",
            "git+https://github.com/GitGuardian/ggmcp.git",
            "developer-mcp-server"
          ]
        }
      }
    }
    

Installation with Claude Desktop

  1. Edit your Claude Desktop MCP configuration file located at:

    • macOS: ~/Library/Application Support/Claude Desktop/mcp.json
    • Windows: %APPDATA%\Claude Desktop\mcp.json
  2. Add the GitGuardian MCP server configuration:

    {
      "mcpServers": {
        "GitGuardianDeveloper": {
          "command": "/path/to/uvx",
          "args": [
            "--from",
            "git+https://github.com/GitGuardian/ggmcp.git",
            "developer-mcp-server"
          ]
        }
      }
    }
    
  3. Replace /path/to/uvx with the absolute path to the uvx executable on your system.

    ⚠️ WARNING: For Claude Desktop, you must specify the full absolute path to the uvx executable, not just "command": "uvx". This is different from other MCP clients.

  4. Restart Claude Desktop to apply the changes.

Installation with Windsurf

To use the GitGuardian MCP server with Windsurf:

  1. Edit your Windsurf MCP configuration file located at:

    • macOS: ~/Library/Application Support/Windsurf/mcp.json
    • Windows: %APPDATA%\Windsurf\mcp.json
    • Linux: ~/.config/Windsurf/mcp.json
  2. Add the following entry to the configuration file:

    {
      "mcp": {
        "servers": {
          "GitGuardianDeveloper": {
            "type": "stdio",
            "command": "uvx",
            "args": [
              "--from",
              "git+https://github.com/GitGuardian/ggmcp.git",
              "developer-mcp-server"
            ]
          }
        }
      }
    }
    

Installation with Zed Editor

  1. Edit your Zed MCP configuration file located at:

    • macOS: ~/Library/Application Support/Zed/mcp.json
    • Linux: ~/.config/Zed/mcp.json
  2. Add the GitGuardian MCP server configuration:

    {
      "GitGuardianDeveloper": {
        "command": {
          "path": "uvx",
          "args": [
            "--from",
            "git+https://github.com/GitGuardian/ggmcp.git",
            "developer-mcp-server"
          ]
        }
      }
    }
    

Authentication

The GitGuardian MCP server supports multiple authentication methods depending on your deployment mode.

OAuth Authentication (Default for stdio transport)

When using stdio transport (the default for desktop IDE integrations), the server uses OAuth for authentication by default:

  1. OAuth is enabled by default (ENABLE_LOCAL_OAUTH=true) for local-first usage
  2. When you start the server, it will automatically open a browser window to authenticate with GitGuardian
  3. After you log in to GitGuardian and authorize the application, you'll be redirected back to the local server
  4. The authentication token will be securely stored in ~/.gitguardian/ for future use
  5. The next time you start the server, it will reuse the stored token without requiring re-authentication

Example configuration (OAuth is enabled by default, no need to specify):

{
  "mcpServers": {
    "GitGuardianDeveloper": {
      "command": "uvx",
      "args": [
        "--from",
        "git+https://github.com/GitGuardian/ggmcp.git",
        "developer-mcp-server"
      ]
    }
  }
}

To disable OAuth (e.g., for using PAT instead):

{
  "mcpServers": {
    "GitGuardianDeveloper": {
      "command": "uvx",
      "args": [
        "--from",
        "git+https://github.com/GitGuardian/ggmcp.git",
        "developer-mcp-server"
      ],
      "env": {
        "ENABLE_LOCAL_OAUTH": "false",
        "GITGUARDIAN_PERSONAL_ACCESS_TOKEN": "your_pat_here"
      }
    }
  }
}

Personal Access Token (PAT) Authentication

For non-interactive environments, CI/CD pipelines, or when you prefer not to use OAuth, you can authenticate using a Personal Access Token:

  1. Create a Personal Access Token in your GitGuardian dashboard
  2. Set the GITGUARDIAN_PERSONAL_ACCESS_TOKEN environment variable

Example configuration with PAT:

{
  "mcpServers": {
    "GitGuardianDeveloper": {
      "command": "uvx",
      "args": [
        "--from",
        "git+https://github.com/GitGuardian/ggmcp.git",
        "developer-mcp-server"
      ],
      "env": {
        "GITGUARDIAN_PERSONAL_ACCESS_TOKEN": "your_personal_access_token_here"
      }
    }
  }
}

Per-Request Authentication (HTTP/SSE transport)

When using HTTP/SSE transport (with MCP_PORT set), the server expects authentication via the Authorization header in each HTTP request. This is the recommended approach for server deployments.

Important: Since ENABLE_LOCAL_OAUTH defaults to true, you must explicitly set it to false when using HTTP/SSE mode:

# Start server with HTTP transport (OAuth must be disabled)
ENABLE_LOCAL_OAUTH=false MCP_PORT=8000 MCP_HOST=127.0.0.1 uvx --from git+https://github.com/GitGuardian/ggmcp.git developer-mcp-server

# Make authenticated request
curl -X POST http://127.0.0.1:8000/tools/list \
  -H "Authorization: Bearer YOUR_PERSONAL_ACCESS_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{}'

Configuration validation: The server will raise an error if both MCP_PORT and ENABLE_LOCAL_OAUTH=true are set, as HTTP/SSE mode requires per-request authentication for security reasons.

Configuration for Different GitGuardian Instances

The MCP server uses OAuth authentication and defaults to GitGuardian SaaS (US region) at https://dashboard.gitguardian.com. For other instances, you'll need to specify the URL:

Environment Variables

The following environment variables can be configured:

| Variable | Description | Default | Example | |----------|-------------|---------|---------| | GITGUARDIAN_URL | GitGuardian instance URL | `https:/

View on GitHub
GitHub Stars34
CategoryDevelopment
Updated4d ago
Forks13

Languages

Python

Security Score

95/100

Audited on Apr 3, 2026

No findings