Scans your codebase for security vulnerabilities including dangerous function calls (strcpy, eval, system), weak cryptography (MD5, SHA1), hardcoded secrets, unsafe patterns, and architectural layer violations. Ships with 40+ rules covering 13 languages.
| Parameter | Type | Required | Default | Description |
|---|---|---|---|---|
scope | string | No | workspace | Path filter to narrow the scan (e.g., src/api/) |
severity | enum | No | medium | Minimum severity to report: critical, high, medium, low |
category | string | No | all | Filter by category: injection, xss, overflow, crypto, secrets, unsafe |
Scan my project for security vulnerabilities.
Run a security scan on src/ — only show critical and high severity findings.
Stellarion returns findings filtered to critical and high, skipping informational and medium-severity matches.
Scan for hardcoded secrets and API keys in the codebase.
Uses category: "secrets" to focus on patterns like hardcoded passwords, API keys, tokens, and connection strings.
Are we using any weak crypto algorithms? Check for MD5 and SHA1.
Uses category: "crypto" to find weak hashing algorithms, insecure random number generators, and deprecated cipher suites.
Returns a list of findings, each containing:
dangerous-eval, weak-hash-md5)critical, high, medium, or lowinjection, xss, overflow, crypto, secrets, or unsafeseverity: "high" to focus on actionable issues before expanding to mediumscope to scan only changed directories during code reviewstellarion_assess_change_risk to understand whether a security finding is in a high-traffic code path