Get security scanning INSIDE your AI assistant in 60 seconds.
Claude Desktop (GUI app) and Claude Code CLI (terminal) are separate products with different configs.
| Product | Type | Config File |
|---|---|---|
| Claude Desktop | GUI app | %APPDATA%\Claude\claude_desktop_config.json |
| Claude Code CLI | Terminal | ~/.claude.json or C:\Users\[user]\.claude.json |
Make sure you configure the right one!
cd /path/to/shellockolm
python src/configure_mcp.pyWhat it does:
- Detects your installed AI tools (Claude Desktop, Claude Code CLI, Copilot, Cursor, etc.)
- Automatically writes config files
- That's it!
python src/configure_mcp.py
# Select: [1] Claude DesktopConfig location:
- Windows:
%APPDATA%\Claude\claude_desktop_config.json - macOS:
~/Library/Application Support/Claude/claude_desktop_config.json
- Close Claude Desktop completely
- Wait 5 seconds
- Reopen Claude Desktop
Open Claude Desktop and ask:
"What MCP tools do you have?"
You should see shellockolm listed with 6 tools.
You: "Scan this project for vulnerabilities"
Claude: "I'll scan this directory using shellockolm..."
[Uses scan_directory tool automatically]
Claude: "Found 3 vulnerabilities:
- CVE-2025-55182 (CRITICAL) in React 19.0.0
- CVE-2025-55130 (HIGH) in Node.js
- Exposed API key in .env file
Would you like me to help fix these?"
More examples:
- "Check if I'm vulnerable to CVE-2025-55182"
- "Scan G:\myproject for React CVEs"
- "Is https://myapp.com hackable?"
- "Generate a security report"
Claude Code CLI uses: ~/.claude.json (or C:\Users\[user]\.claude.json on Windows)
This is NOT the same as Claude Desktop!
Option 1: Automatic
python src/configure_mcp.py
# Select: Claude Code CLIOption 2: Manual
-
Find your project in the config:
# Windows notepad C:\Users\[USERNAME]\.claude.json # macOS/Linux nano ~/.claude.json
-
Find your project's
mcpServerssection:"projects": { "C:/Users/hlaro": { "mcpServers": { "memory-sync": { ... } } } }
-
Add shellockolm (note the
"type": "stdio"):"mcpServers": { "memory-sync": { ... }, "shellockolm": { "type": "stdio", "command": "python", "args": ["G:\\shellockholm\\src\\mcp_server.py"], "env": { "PYTHONPATH": "G:\\shellockholm\\src" } } }
-
Save and restart Claude Code CLI
-
Start Claude Code CLI:
claude
-
Check MCP servers:
- Look for the MCP menu
- Should see
shellockolmlisted - Status should be ✔ connected
-
Test it:
# In Claude Code CLI chat: "Use shellockolm to scan this directory for vulnerabilities" "List available scanners" "What CVEs does shellockolm track?"
$ claude
❯ Use shellockolm to scan G:\ for vulnerabilities
● I'll scan your G:\ drive for vulnerabilities using shellockolm.
shellockolm - scan_directory (MCP)
├─ path: "G:\\"
└─ recursive: true
[Scan runs automatically]
● Found 5 vulnerabilities:
- CVE-2025-55182 (CRITICAL) - React Server Components RCE
- CVE-2025-55130 (HIGH) - Node.js permission bypass
- CLAWDBOT-CREDS (HIGH) - Exposed API tokens
...
Would you like me to explain how to fix these?# Install Copilot CLI if needed
gh extension install github/gh-copilot
# Configure MCP
python src/configure_mcp.py
# Select: [2] GitHub Copilot CLIManual config (if auto-config fails):
Edit ~/.config/github-copilot/mcp.json:
{
"servers": {
"shellockolm": {
"command": "python",
"args": ["src/mcp_server.py"],
"cwd": "/absolute/path/to/shellockolm",
"env": {
"PYTHONPATH": "/absolute/path/to/shellockolm/src"
}
}
}
}# Suggest mode
gh copilot suggest "scan this directory for CVEs"
# Chat mode
gh copilot chat
> Use shellockolm to scan for vulnerabilities
> What React CVEs are tracked?
> Check if my Next.js app is vulnerablegh copilot chat
> What tools can you use?
# Should list shellockolm# Install Gemini CLI
npm install -g @google/generative-ai-cli
# Configure
mkdir -p ~/.gemini
cat > ~/.gemini/mcp-config.json << 'EOF'
{
"mcpServers": {
"shellockolm": {
"command": "python",
"args": ["src/mcp_server.py"],
"cwd": "/absolute/path/to/shellockolm",
"env": {
"PYTHONPATH": "/absolute/path/to/shellockolm/src"
}
}
}
}
EOFgemini chat
> Scan this project for security vulnerabilities
> What CVEs does shellockolm track?
> Check my app for exploits- Open Cursor
- Press
Cmd/Ctrl + ,(Settings) - Search: "MCP Servers"
- Click "Add MCP Server"
- Fill in:
Name: shellockolm Command: python Args: ["src/mcp_server.py"] Working Directory: /absolute/path/to/shellockolm - Click Save
- Restart Cursor
@shellockolm scan this directory
@shellockolm check CVE-2025-55182
@shellockolm what scanners do you have?
Edit ~/.continue/config.json:
{
"mcpServers": [
{
"name": "shellockolm",
"command": "python",
"args": ["src/mcp_server.py"],
"cwd": "/absolute/path/to/shellockolm"
}
]
}Reload VS Code window: Cmd/Ctrl + Shift + P → "Reload Window"
Same as Cursor - tag with @shellockolm or just ask naturally.
"Scan this project for vulnerabilities"
"Check G:\myproject for CVEs"
"Find security issues in my React app"
"Scan all subdirectories for exploits"
"Is https://myapp.com vulnerable?"
"Check if my website is hackable"
"Test myapp.com for Next.js exploits"
"Probe this URL for vulnerabilities"
"What is CVE-2025-55182?"
"Show all React CVEs"
"List critical vulnerabilities"
"What CVEs do you track?"
"What scanners are available?"
"Generate a security report"
"Create JSON report for this directory"
"Show me all findings in detail"
In any AI tool:
"What MCP tools do you have access to?"
✅ Working: AI lists shellockolm with tools
❌ Not Working: AI says "I don't have access to MCP tools"
"Use shellockolm to list available scanners"
✅ Working: Returns table with 7 scanners
❌ Not Working: Error or "I can't do that"
- Check config file location
- Use absolute paths (not relative)
- Restart AI tool completely
Update config to use full Python path:
"command": "/usr/bin/python3" // macOS/Linux
"command": "C:\\Python312\\python.exe" // WindowsCheck PYTHONPATH in config:
"env": {
"PYTHONPATH": "/absolute/path/to/shellockolm/src"
}-
Test MCP server manually:
cd /path/to/shellockolm python src/mcp_server.py # Should start without errors
-
Check AI tool logs:
- Claude Desktop: Help → Show Logs
- Copilot:
gh copilot --debug - Cursor: View → Output → MCP
-
See full guide: MCP_SETUP.md
- Complete MCP Setup Guide - All details
- README - Main documentation
- GitHub Issues - Report problems
Built with 🔍 by @hlsitechio & AI (Claude + GitHub Copilot)