Your Securin expertise, open to every AI agent your team uses.

Securin's data and workflows, opened to the AI ecosystem — on open standards, on your terms. Works with Claude, Gemini, Codex, Windsurf, and any MCP host.

Sign in with your existing Securin SSO. No tokens to paste.

6curated skills
5+supported AI hosts
50+MCP tools

Not another walled garden

Securin meets you in the AI tools you already use.

Open by design

Public skills repo, MCP open standard, MIT-licensed. Inspect, audit, fork.

AI-native, host-agnostic

Works with Claude, Gemini, Codex, Windsurf, and any MCP host.

Built to be extended

Curated skills package the Securin playbook — fork them and ship workflows your team needs.

Talk to Securin. Get answers grounded in your environment.

Natural-language access to your data — investigate, triage, and build the dashboards your team actually needs, right inside your AI tool.

Minutes, not hours

Investigations that took multiple queries and exports become a single conversation.

Senior-level output, every analyst

Securin's vulnerability-management playbook is encoded as guidance your AI follows.

Wherever your team works

Use the AI host of your choice. No new tab to open, no new workflow.

Three steps to put it to work today.

Self-serve. Available now to every Securin customer.

01

Install

Add the public marketplace to your AI host, or add the MCP configuration in one click.

02

Sign in

SSO through platform.securin.io. Scoped to the access your identity already has.

03

Ask & extend

Triage, correlate, report — then fork the skills repo to build your own.

Pick your AI assistant

All hosts use the same MCP server at mcp.securin.io/mcp.

One-click install

  1. Download securin-platform.mcpb (1.5 MB).
  2. Open the file. Claude Desktop installs the MCP server automatically.
  3. Sign in to Securin when the browser opens. You're done.

Skills are not loaded by Claude Desktop. For the full experience (skills + MCP), use Claude Code.

Manual setup (config file)

Edit ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):

{
  "mcpServers": {
    "securin": {
      "command": "npx",
      "args": ["-y", "mcp-remote", "https://mcp.securin.io/mcp"]
    }
  }
}

Save, then fully quit and relaunch Claude Desktop. Requires Node.js 18+.

Claude Teams & Enterprise — add via UI

Organization owners can add the connector from claude.ai — no file editing needed:

  1. Go to Organization Settings → Connectors → Add → Custom → Web
  2. Enter name: Securin Platform
  3. Enter URL: https://mcp.securin.io/mcp
  4. Click Add

Team members then go to Customize → Connectors, find Securin Platform, and click Connect — the browser redirects to Securin for sign-in automatically.

Claude Cowork — Skills Plugin

After adding the MCP connector, each team member can install the Skills Plugin to access the 6 guided workflows within Claude Cowork:

  1. In Claude Cowork, open Customize from the left sidebar.
  2. Under Personal Plugins, click the + icon and select Create Plugin.
  3. Choose Add Marketplace, enter the repository URL: https://github.com/securin-public/securin-skills, then click Sync.
  4. The Securin Platform plugin will appear under Personal in the plugins directory.
  5. Click + next to Securin Platform to activate it.
  6. The skills are now active — start asking questions in any conversation.

Real work, on day one.

Investigate, triage, fix, and report — all in one conversation.

Investigate

“Enrich CVE-2024-3400.”

One-page intel briefing — CVSS, EPSS, KEV, exploitation history, threat actors.

“Am I exposed to the latest zero-days?”

Zero-day exposures in your environment, affected assets, KEV overlap, fixes.

“Are we vulnerable to LockBit?”

Threat-to-environment correlation: matched CVEs, affected assets, clear verdict.

Triage, fix, report

“Show open critical exposures breaching SLA.”

Ranked exposure list with severity distribution and one-click pivots into the platform.

“How do I fix exposure 12345?”

Patch guidance from your scanner integrations, turned into actionable steps.

“Build a dashboard of critical exposures by workspace.”

Custom charts and widgets your AI designs — rendered live in your tool, refreshing on every prompt.

See all 6 skills
SkillExample ask
securin-cve-enrichment"Enrich CVE-2024-3400." — CVSS, EPSS, KEV, exploitation history, threat actors.
securin-zero-day-exposure-analysis"Am I exposed to any zero-days?" — Open zero-day exposures with affected assets and remediation pointers.
securin-threat-correlation"Am I affected by LockBit?" — Maps a CVE, threat actor, or ransomware group to your environment.
securin-asset-triage"Break down assets by criticality and workspace." — Search, filter, aggregate.
securin-exposure-triage"Show open criticals breaching SLA." — Ranked exposure lists or aggregated views.
securin-remediation-guidance"How do I fix exposure 12345?" — Actionable fix plans, vendor advisories, ticket bodies.

Authentication

Two endpoints, same tools. Pick by how you connect.

Bearer token Headless

For CI/CD, scripts, and server-to-server. Generate client_id & client_secret in App Access on the Securin Platform.

Exchange for an access token:

curl -X POST https://platformapi.securin.io/account-service/api/v1/oauth2/token \
  -H "Content-Type: application/x-www-form-urlencoded" \
  -d "client_id=<id>&client_secret=<secret>"

Connect to /api/mcp with Authorization: Bearer <token>.

Self-serve. Available now to every Securin customer.

Install the MCP for your tool of choice — your first query opens a browser to sign you in.

Download for Claude Desktop View on GitHub →