Skip to content

Your AI now audits
SQL Injection

with parameterized query rules

Context-aware security rules for AI-generated code in Claude Code, Cursor, and Windsurf.

Install for
$npx -y -p @auditormcp/mcp auditor install --client claude

Exploitation risk benchmarking

Impact measured across thousands of AI-generated code reviews.

Risk of exploitation in AI-generated code, before and after Auditor

Without Auditor
With Auditor

Set it once. Secure everything.

Auditor plugs into your AI tools and enforces security rules tailored to your stack on every generation.

Meet the founders

Giuseppe Pretto
Giuseppe Pretto
CEO

AI specialist & Head of R&D at a fintech company

Building the security layer between LLMs and production code. AI research & fintech background.

Eduardo Contin
Eduardo Contin
CTO

Cybersecurity expert · ex-Siemens & Guidewire

Designs Auditor's core security engine. Enterprise cybersecurity background.

Works with
anything
you use
VSCode
VSCode
Claude
Claude
Cursor
Cursor
OpenAI
OpenAI
N8N
N8N
Windsurf
Windsurf
VSCode
VSCode
Claude
Claude
Cursor
Cursor
OpenAI
OpenAI
N8N
N8N
Windsurf
Windsurf
VSCode
VSCode
Claude
Claude
Cursor
Cursor
OpenAI
OpenAI
N8N
N8N
Windsurf
Windsurf
VSCode
VSCode
Claude
Claude
Cursor
Cursor
OpenAI
OpenAI
N8N
N8N
Windsurf
Windsurf

Teams using Auditor

Short reviews from engineers using it in practice.

Review

Auditor removed a lot of review noise for us. Instead of re-explaining the same auth and secrets issues on every PR, the guardrails were already there when the code was generated.

L
LucaStaff Engineer
Review

What stood out was how practical it felt. The setup took minutes, the MCP flow was clean, and the output actually matched the stack we run in production.

N
NinaPlatform Lead
Review

We use AI heavily, but the security drift was real. Auditor made codegen much more trustworthy without slowing the team down or adding another review checklist.

M
MateoApplication Security

Commonquestions

Auditor is a CLI + MCP workflow for AI-assisted security reviews. The CLI detects your stack, writes auditor.json, and the MCP server uses that context to fetch the most relevant security rules for the project.

Auditor detects your language, frameworks, and deployment context, computes a stack fingerprint, and creates auditor.json. If you are signed in, it can also sync hashed project metadata and stack info to the Auditor backend.

Not for local setup. You can run init, update, status, and doctor without an account. But fetching rules through the MCP server and syncing projects to the backend requires authentication via auditor login.

The built-in installer supports Claude, Cursor, and Windsurf. Auditor runs as a stdio MCP server, so other MCP-compatible clients can be wired manually if needed.

Auditor detects Node.js, Python, Go, and Java projects. It also tags common frameworks and tools such as Express, Next.js, Nest, Fastify, Prisma, Sequelize, TypeORM, Mongoose, React, GraphQL, JWT, FastAPI, Django, Flask, SQLAlchemy, Pydantic, plus Docker and Kubernetes context when present.

No source code is uploaded for stack detection. Auditor reads manifest files locally to infer the stack. When you sign in, it can send project metadata such as project name, path hash, language, frameworks, context, fingerprint, and rules queries based on tags.

init creates auditor.json for the first time. update refreshes it only when the stack fingerprint changes. audit runs update and then prints the prompt to use Auditor in your AI client. doctor checks your environment, backend connectivity, and authenticated rules access.

Run auditor update. Auditor recalculates the fingerprint from your manifest files and rewrites auditor.json only when the detected stack actually changed.