Securin's data and workflows, opened to the AI ecosystem — on open standards, on your terms. Works with Claude, Gemini, Codex, Windsurf, and any MCP host.
Securin meets you in the AI tools you already use.
Public skills repo, MCP open standard, MIT-licensed. Inspect, audit, fork.
Works with Claude, Gemini, Codex, Windsurf, and any MCP host.
Curated skills package the Securin playbook — fork them and ship workflows your team needs.
Natural-language access to your data — investigate, triage, and build the dashboards your team actually needs, right inside your AI tool.
Investigations that took multiple queries and exports become a single conversation.
Securin's vulnerability-management playbook is encoded as guidance your AI follows.
Use the AI host of your choice. No new tab to open, no new workflow.
Self-serve. Available now to every Securin customer.
Add the public marketplace to your AI host, or add the MCP configuration in one click.
SSO through platform.securin.io. Scoped to the access your identity already has.
Triage, correlate, report — then fork the skills repo to build your own.
All hosts use the same MCP server at mcp.securin.io/mcp.
securin-platform.mcpb (1.5 MB).Skills are not loaded by Claude Desktop. For the full experience (skills + MCP), use Claude Code.
Edit ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"securin": {
"command": "npx",
"args": ["-y", "mcp-remote", "https://mcp.securin.io/mcp"]
}
}
}
Save, then fully quit and relaunch Claude Desktop. Requires Node.js 18+.
Organization owners can add the connector from claude.ai — no file editing needed:
Securin Platformhttps://mcp.securin.io/mcpTeam members then go to Customize → Connectors, find Securin Platform, and click Connect — the browser redirects to Securin for sign-in automatically.
After adding the MCP connector, each team member can install the Skills Plugin to access the 6 guided workflows within Claude Cowork:
https://github.com/securin-public/securin-skills, then click Sync.Investigate, triage, fix, and report — all in one conversation.
“Enrich CVE-2024-3400.”
One-page intel briefing — CVSS, EPSS, KEV, exploitation history, threat actors.
“Am I exposed to the latest zero-days?”
Zero-day exposures in your environment, affected assets, KEV overlap, fixes.
“Are we vulnerable to LockBit?”
Threat-to-environment correlation: matched CVEs, affected assets, clear verdict.
“Show open critical exposures breaching SLA.”
Ranked exposure list with severity distribution and one-click pivots into the platform.
“How do I fix exposure 12345?”
Patch guidance from your scanner integrations, turned into actionable steps.
“Build a dashboard of critical exposures by workspace.”
Custom charts and widgets your AI designs — rendered live in your tool, refreshing on every prompt.
| Skill | Example ask |
|---|---|
| securin-cve-enrichment | "Enrich CVE-2024-3400." — CVSS, EPSS, KEV, exploitation history, threat actors. |
| securin-zero-day-exposure-analysis | "Am I exposed to any zero-days?" — Open zero-day exposures with affected assets and remediation pointers. |
| securin-threat-correlation | "Am I affected by LockBit?" — Maps a CVE, threat actor, or ransomware group to your environment. |
| securin-asset-triage | "Break down assets by criticality and workspace." — Search, filter, aggregate. |
| securin-exposure-triage | "Show open criticals breaching SLA." — Ranked exposure lists or aggregated views. |
| securin-remediation-guidance | "How do I fix exposure 12345?" — Actionable fix plans, vendor advisories, ticket bodies. |
Two endpoints, same tools. Pick by how you connect.
For people using AI tools. Sign in once via your browser. Scoped to the access your identity already has — the session caches under ~/.mcp-auth and refreshes silently.
Endpoint: https://mcp.securin.io/mcp
To switch identities: rm -rf ~/.mcp-auth and reconnect. In Claude Code: /mcp → select securin → Clear credentials.
For CI/CD, scripts, and server-to-server. Generate client_id & client_secret in App Access on the Securin Platform.
Exchange for an access token:
curl -X POST https://platformapi.securin.io/account-service/api/v1/oauth2/token \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "client_id=<id>&client_secret=<secret>"
Connect to /api/mcp with Authorization: Bearer <token>.
Install the MCP for your tool of choice — your first query opens a browser to sign you in.