[{"data":1,"prerenderedAt":726},["ShallowReactive",2],{"navigation_docs":3,"-tools-scan-security":340,"-tools-scan-security-surround":721},[4,30,55,254,271,294,311],{"title":5,"path":6,"stem":7,"children":8,"page":29},"Getting Started","/getting-started","1.getting-started",[9,13,17,21,25],{"title":10,"path":11,"stem":12},"Introduction","/getting-started/introduction","1.getting-started/1.introduction",{"title":14,"path":15,"stem":16},"Platform","/getting-started/platforms","1.getting-started/2.platforms",{"title":18,"path":19,"stem":20},"Installation","/getting-started/installation","1.getting-started/3.installation",{"title":22,"path":23,"stem":24},"Licensing","/getting-started/licensing","1.getting-started/4.licensing",{"title":26,"path":27,"stem":28},"Quick Start","/getting-started/quick-start","1.getting-started/5.quick-start",false,{"title":31,"path":32,"stem":33,"children":34,"page":29},"Features","/features","2.features",[35,39,43,47,51],{"title":36,"path":37,"stem":38},"Features Overview","/features/overview","2.features/1.overview",{"title":40,"path":41,"stem":42},"Code Quality Metrics","/features/code-quality-metrics","2.features/2.code-quality-metrics",{"title":44,"path":45,"stem":46},"Technical Debt Analysis","/features/technical-debt-analysis","2.features/3.technical-debt-analysis",{"title":48,"path":49,"stem":50},"Code Search","/features/code-search","2.features/4.code-search",{"title":52,"path":53,"stem":54},"Reports","/features/reports","2.features/5.reports",{"title":56,"path":57,"stem":58,"children":59,"page":29},"Tools","/tools","3.tools",[60,64,68,72,76,80,84,88,92,96,100,104,108,112,116,120,124,128,132,136,142,148,154,158,162,166,170,174,178,182,186,190,194,198,202,206,210,214,218,222,226,230,234,238,242,246,250],{"title":61,"path":62,"stem":63},"Tools Overview","/tools/overview","3.tools/1.overview",{"title":65,"path":66,"stem":67},"stellarion_get_symbol_info","/tools/get-symbol-info","3.tools/10.get-symbol-info",{"title":69,"path":70,"stem":71},"stellarion_symbol_search","/tools/symbol-search","3.tools/11.symbol-search",{"title":73,"path":74,"stem":75},"stellarion_get_callers","/tools/get-callers","3.tools/12.get-callers",{"title":77,"path":78,"stem":79},"stellarion_get_callees","/tools/get-callees","3.tools/13.get-callees",{"title":81,"path":82,"stem":83},"stellarion_get_detailed_symbol","/tools/get-detailed-symbol","3.tools/14.get-detailed-symbol",{"title":85,"path":86,"stem":87},"stellarion_find_by_imports","/tools/find-by-imports","3.tools/15.find-by-imports",{"title":89,"path":90,"stem":91},"stellarion_find_by_signature","/tools/find-by-signature","3.tools/16.find-by-signature",{"title":93,"path":94,"stem":95},"stellarion_find_entry_points","/tools/find-entry-points","3.tools/17.find-entry-points",{"title":97,"path":98,"stem":99},"stellarion_find_implementors","/tools/find-implementors","3.tools/18.find-implementors",{"title":101,"path":102,"stem":103},"stellarion_traverse_graph","/tools/traverse-graph","3.tools/19.traverse-graph",{"title":105,"path":106,"stem":107},"stellarion_get_ai_context","/tools/get-ai-context","3.tools/2.get-ai-context",{"title":109,"path":110,"stem":111},"stellarion_memory_store","/tools/memory-store","3.tools/20.memory-store",{"title":113,"path":114,"stem":115},"stellarion_memory_search","/tools/memory-search","3.tools/21.memory-search",{"title":117,"path":118,"stem":119},"stellarion_memory_get","/tools/memory-get","3.tools/22.memory-get",{"title":121,"path":122,"stem":123},"stellarion_memory_context","/tools/memory-context","3.tools/23.memory-context",{"title":125,"path":126,"stem":127},"stellarion_memory_invalidate","/tools/memory-invalidate","3.tools/24.memory-invalidate",{"title":129,"path":130,"stem":131},"stellarion_memory_list","/tools/memory-list","3.tools/25.memory-list",{"title":133,"path":134,"stem":135},"stellarion_memory_stats","/tools/memory-stats","3.tools/26.memory-stats",{"title":137,"path":138,"stem":139,"children":140},"stellarion_reindex_workspace","/tools/reindex-workspace","3.tools/27.reindex-workspace",[141],{"title":137,"path":138,"stem":139},{"title":143,"path":144,"stem":145,"children":146},"stellarion_index_files","/tools/index-files","3.tools/28.index-files",[147],{"title":143,"path":144,"stem":145},{"title":149,"path":150,"stem":151,"children":152},"stellarion_index_directory","/tools/index-directory","3.tools/29.index-directory",[153],{"title":149,"path":150,"stem":151},{"title":155,"path":156,"stem":157},"stellarion_get_edit_context","/tools/get-edit-context","3.tools/3.get-edit-context",{"title":159,"path":160,"stem":161},"stellarion_scan_security [Pro]","/tools/scan-security","3.tools/30.scan-security",{"title":163,"path":164,"stem":165},"stellarion_analyze_coupling [Pro]","/tools/analyze-coupling","3.tools/31.analyze-coupling",{"title":167,"path":168,"stem":169},"stellarion_find_unused_code [Pro]","/tools/find-unused-code","3.tools/32.find-unused-code",{"title":171,"path":172,"stem":173},"stellarion_codebase_health [Pro]","/tools/codebase-health","3.tools/33.codebase-health",{"title":175,"path":176,"stem":177},"stellarion_tech_debt_report [Pro]","/tools/tech-debt-report","3.tools/34.tech-debt-report",{"title":179,"path":180,"stem":181},"stellarion_assess_change_risk [Pro]","/tools/assess-change-risk","3.tools/35.assess-change-risk",{"title":183,"path":184,"stem":185},"stellarion_dependency_drift [Pro]","/tools/dependency-drift","3.tools/36.dependency-drift",{"title":187,"path":188,"stem":189},"stellarion_api_surface [Pro]","/tools/api-surface","3.tools/37.api-surface",{"title":191,"path":192,"stem":193},"stellarion_find_duplicates [Pro]","/tools/find-duplicates","3.tools/38.find-duplicates",{"title":195,"path":196,"stem":197},"stellarion_find_similar [Pro]","/tools/find-similar","3.tools/39.find-similar",{"title":199,"path":200,"stem":201},"stellarion_get_curated_context","/tools/get-curated-context","3.tools/4.get-curated-context",{"title":203,"path":204,"stem":205},"stellarion_cluster_symbols [Pro]","/tools/cluster-symbols","3.tools/40.cluster-symbols",{"title":207,"path":208,"stem":209},"stellarion_compare_symbols [Pro]","/tools/compare-symbols","3.tools/41.compare-symbols",{"title":211,"path":212,"stem":213},"stellarion_mine_git_history [Pro]","/tools/mine-git-history","3.tools/42.mine-git-history",{"title":215,"path":216,"stem":217},"stellarion_mine_git_history_for_file [Pro]","/tools/mine-git-history-for-file","3.tools/43.mine-git-history-for-file",{"title":219,"path":220,"stem":221},"stellarion_search_git_history [Pro]","/tools/search-git-history","3.tools/44.search-git-history",{"title":223,"path":224,"stem":225},"stellarion_find_eda_calls [Pro · EDA]","/tools/find-eda-calls","3.tools/45.find-eda-calls",{"title":227,"path":228,"stem":229},"stellarion_get_flow_graph [Pro · EDA]","/tools/get-flow-graph","3.tools/46.get-flow-graph",{"title":231,"path":232,"stem":233},"stellarion_find_duplicate_constraints [Pro · EDA]","/tools/find-duplicate-constraints","3.tools/47.find-duplicate-constraints",{"title":235,"path":236,"stem":237},"stellarion_analyze_impact","/tools/analyze-impact","3.tools/5.analyze-impact",{"title":239,"path":240,"stem":241},"stellarion_analyze_complexity","/tools/analyze-complexity","3.tools/6.analyze-complexity",{"title":243,"path":244,"stem":245},"stellarion_get_call_graph","/tools/get-call-graph","3.tools/7.get-call-graph",{"title":247,"path":248,"stem":249},"stellarion_get_dependency_graph","/tools/get-dependency-graph","3.tools/8.get-dependency-graph",{"title":251,"path":252,"stem":253},"stellarion_find_related_tests","/tools/find-related-tests","3.tools/9.find-related-tests",{"title":255,"path":256,"stem":257,"children":258,"page":29},"Integrations","/integrations","4.integrations",[259,263,267],{"title":260,"path":261,"stem":262},"Claude Code","/integrations/claude-code","4.integrations/1.claude-code",{"title":264,"path":265,"stem":266},"Cursor","/integrations/cursor","4.integrations/2.cursor",{"title":268,"path":269,"stem":270},"Other MCP Clients","/integrations/other-mcp-clients","4.integrations/3.other-mcp-clients",{"title":272,"path":273,"stem":274,"children":275,"page":29},"Guides","/guides","5.guides",[276,282,286,290],{"title":277,"path":278,"stem":279,"children":280},"Indexing Your Project","/guides/indexing-your-project","5.guides/1.indexing-your-project",[281],{"title":277,"path":278,"stem":279},{"title":283,"path":284,"stem":285},"Improving Code Quality","/guides/improving-code-quality","5.guides/2.improving-code-quality",{"title":287,"path":288,"stem":289},"Reducing Technical Debt","/guides/reducing-technical-debt","5.guides/3.reducing-technical-debt",{"title":291,"path":292,"stem":293},"Slash Commands","/guides/slash-commands","5.guides/4.slash-commands",{"title":295,"path":296,"stem":297,"children":298,"page":29},"Reference","/reference","6.reference",[299,303,307],{"title":300,"path":301,"stem":302},"CLI Commands","/reference/cli-commands","6.reference/1.cli-commands",{"title":304,"path":305,"stem":306},"Environment Variables","/reference/environment-variables","6.reference/2.environment-variables",{"title":308,"path":309,"stem":310},"Troubleshooting","/reference/troubleshooting","6.reference/3.troubleshooting",{"title":312,"path":313,"stem":314,"children":315,"page":29},"Quality","/quality","7.quality",[316,320,324,328,332,336],{"title":317,"path":318,"stem":319},"Code Quality Metrics Overview","/quality/stellarion_quality_metrics","7.quality/1.Stellarion_Quality_Metrics",{"title":321,"path":322,"stem":323},"Cognitive Complexity","/quality/cognitive-complexity","7.quality/2.cognitive-complexity",{"title":325,"path":326,"stem":327},"Cyclomatic Complexity","/quality/cyclomatic-complexity","7.quality/3.cyclomatic-complexity",{"title":329,"path":330,"stem":331},"Maintainability Index","/quality/maintainability","7.quality/4.maintainability",{"title":333,"path":334,"stem":335},"Circular Dependencies","/quality/circular-dependencies","7.quality/5.circular-dependencies",{"title":337,"path":338,"stem":339},"Unused Code Detection","/quality/unused-code","7.quality/6.unused-code",{"id":341,"title":159,"body":342,"description":714,"extension":715,"links":716,"meta":717,"navigation":718,"path":160,"seo":719,"stem":161,"__hash__":720},"docs/3.tools/30.scan-security.md",{"type":343,"value":344,"toc":700},"minimark",[345,358,381,386,402,406,524,528,533,543,547,553,562,566,572,579,583,589,595,599,602,666,670],[346,347,349,350,357],"callout",{"type":348},"info","This is a Pro tool. Requires a ",[351,352,356],"a",{"href":353,"rel":354},"https://stellarion.ai/pro",[355],"nofollow","Stellarion Pro license",". A 180-day free trial starts automatically.",[359,360,361,362,366,367,366,370,373,374,366,377,380],"p",{},"Scans your codebase for security vulnerabilities including dangerous function calls (",[363,364,365],"code",{},"strcpy",", ",[363,368,369],{},"eval",[363,371,372],{},"system","), weak cryptography (",[363,375,376],{},"MD5",[363,378,379],{},"SHA1","), hardcoded secrets, unsafe patterns, and architectural layer violations. Ships with 40+ rules covering 13 languages.",[382,383,385],"h2",{"id":384},"when-to-use","When to Use",[387,388,389,393,396,399],"ul",{},[390,391,392],"li",{},"Before a security review or audit to get a baseline",[390,394,395],{},"After adding new dependencies or integrations",[390,397,398],{},"In CI pipelines as a security gate",[390,400,401],{},"When onboarding to an unfamiliar codebase to find existing risks",[382,403,405],{"id":404},"parameters","Parameters",[407,408,409,431],"table",{},[410,411,412],"thead",{},[413,414,415,419,422,425,428],"tr",{},[416,417,418],"th",{},"Parameter",[416,420,421],{},"Type",[416,423,424],{},"Required",[416,426,427],{},"Default",[416,429,430],{},"Description",[432,433,434,458,489],"tbody",{},[413,435,436,442,445,448,451],{},[437,438,439],"td",{},[363,440,441],{},"scope",[437,443,444],{},"string",[437,446,447],{},"No",[437,449,450],{},"workspace",[437,452,453,454,457],{},"Path filter to narrow the scan (e.g., ",[363,455,456],{},"src/api/",")",[413,459,460,465,468,470,475],{},[437,461,462],{},[363,463,464],{},"severity",[437,466,467],{},"enum",[437,469,447],{},[437,471,472],{},[363,473,474],{},"medium",[437,476,477,478,366,481,366,484,366,486],{},"Minimum severity to report: ",[363,479,480],{},"critical",[363,482,483],{},"high",[363,485,474],{},[363,487,488],{},"low",[413,490,491,496,498,500,503],{},[437,492,493],{},[363,494,495],{},"category",[437,497,444],{},[437,499,447],{},[437,501,502],{},"all",[437,504,505,506,366,509,366,512,366,515,366,518,366,521],{},"Filter by category: ",[363,507,508],{},"injection",[363,510,511],{},"xss",[363,513,514],{},"overflow",[363,516,517],{},"crypto",[363,519,520],{},"secrets",[363,522,523],{},"unsafe",[382,525,527],{"id":526},"examples","Examples",[529,530,532],"h3",{"id":531},"scan-entire-project-for-medium-issues","Scan entire project for medium+ issues",[534,535,540],"pre",{"className":536,"code":538,"language":539},[537],"language-text","Scan my project for security vulnerabilities.\n","text",[363,541,538],{"__ignoreMap":542},"",[529,544,546],{"id":545},"focus-on-critical-issues-only","Focus on critical issues only",[534,548,551],{"className":549,"code":550,"language":539},[537],"Run a security scan on src/ — only show critical and high severity findings.\n",[363,552,550],{"__ignoreMap":542},[359,554,555,556,558,559,561],{},"Stellarion returns findings filtered to ",[363,557,480],{}," and ",[363,560,483],{},", skipping informational and medium-severity matches.",[529,563,565],{"id":564},"check-for-hardcoded-secrets","Check for hardcoded secrets",[534,567,570],{"className":568,"code":569,"language":539},[537],"Scan for hardcoded secrets and API keys in the codebase.\n",[363,571,569],{"__ignoreMap":542},[359,573,574,575,578],{},"Uses ",[363,576,577],{},"category: \"secrets\""," to focus on patterns like hardcoded passwords, API keys, tokens, and connection strings.",[529,580,582],{"id":581},"audit-cryptographic-usage","Audit cryptographic usage",[534,584,587],{"className":585,"code":586,"language":539},[537],"Are we using any weak crypto algorithms? Check for MD5 and SHA1.\n",[363,588,586],{"__ignoreMap":542},[359,590,574,591,594],{},[363,592,593],{},"category: \"crypto\""," to find weak hashing algorithms, insecure random number generators, and deprecated cipher suites.",[382,596,598],{"id":597},"output-format","Output Format",[359,600,601],{},"Returns a list of findings, each containing:",[387,603,604,611,623,638,655,660],{},[390,605,606,610],{},[607,608,609],"strong",{},"File path and line number"," — exact location of the issue",[390,612,613,616,617,366,620,457],{},[607,614,615],{},"Rule name"," — which rule was triggered (e.g., ",[363,618,619],{},"dangerous-eval",[363,621,622],{},"weak-hash-md5",[390,624,625,628,629,366,631,366,633,635,636],{},[607,626,627],{},"Severity"," — ",[363,630,480],{},[363,632,483],{},[363,634,474],{},", or ",[363,637,488],{},[390,639,640,628,643,366,645,366,647,366,649,366,651,635,653],{},[607,641,642],{},"Category",[363,644,508],{},[363,646,511],{},[363,648,514],{},[363,650,517],{},[363,652,520],{},[363,654,523],{},[390,656,657,659],{},[607,658,430],{}," — what the issue is and why it matters",[390,661,662,665],{},[607,663,664],{},"Summary"," — total counts by severity and category",[382,667,669],{"id":668},"tips","Tips",[387,671,672,681,687,694,697],{},[390,673,674,675,678,679],{},"Start with ",[363,676,677],{},"severity: \"high\""," to focus on actionable issues before expanding to ",[363,680,474],{},[390,682,683,684,686],{},"Use ",[363,685,441],{}," to scan only changed directories during code review",[390,688,689,690,693],{},"Combine with ",[363,691,692],{},"stellarion_assess_change_risk"," to understand whether a security finding is in a high-traffic code path",[390,695,696],{},"The scanner uses the already-indexed graph — no re-parsing needed, results are instant",[390,698,699],{},"Layer violations detect cases like database queries in controller code or direct file system access from UI components",{"title":542,"searchDepth":701,"depth":701,"links":702},2,[703,704,705,712,713],{"id":384,"depth":701,"text":385},{"id":404,"depth":701,"text":405},{"id":526,"depth":701,"text":527,"children":706},[707,709,710,711],{"id":531,"depth":708,"text":532},3,{"id":545,"depth":708,"text":546},{"id":564,"depth":708,"text":565},{"id":581,"depth":708,"text":582},{"id":597,"depth":701,"text":598},{"id":668,"depth":701,"text":669},"Scan codebase for security vulnerabilities and unsafe patterns","md",null,{},true,{"title":159,"description":714},"csXs7JwUXBqT7ggh7XYSyPYf0dNenlUkEQlZgJ1cb74",[722,724],{"title":155,"path":156,"stem":157,"description":723,"children":-1},"Assembles source, callers, tests, memories, and git history for editing code",{"title":163,"path":164,"stem":165,"description":725,"children":-1},"Measure module coupling with afferent, efferent, and instability metrics",1777612938328]