Fast security scan of the current repository using Endor Labs. Use when the user says "scan my code", "quick scan", "endor scan", "scan this repo", "run a security scan", or wants a rapid overview of vulnerabilities, secrets, and SAST issues. Also handles incremental PR scans when user mentions "just my changes" or "PR scan". Do NOT use for deep reachability analysis (/endor-scan-full) or checking a single package (/endor-check).
100
100%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Fast security scan of the current repository.
package.json/yarn.lock (JS/TS), go.mod/go.sum (Go), requirements.txt/pyproject.toml/setup.py (Python), pom.xml/build.gradle (Java), Cargo.toml (Rust)Full repository scan (default) - use scan MCP tool:
path: absolute path to repository rootscan_types: ["vulnerabilities", "dependencies", "sast", "secrets"]scan_options: { "quick_scan": true }Incremental PR scan (user mentions "PR", "pull request", "just my changes", "incremental", or is on feature branch):
path and scan_typesscan_options: { "pr_incremental": true }Incremental scan reports only new findings vs base branch. Default to full quick scan if intent is ambiguous.
Always include "sast" in scan_types unless user explicitly requests specific types.
CLI fallback (only if MCP genuinely unavailable):
# Full quick scan
npx -y endorctl scan --path $(pwd) --quick-scan --dependencies --sast --secrets --output-type summary -n <namespace>
# Incremental PR scan
npx -y endorctl scan --path $(pwd) --pr --dependencies --sast --secrets --output-type summary -n <namespace>CLI requires explicit --sast, --secrets, --dependencies flags.
For each critical/high finding UUID, use get_resource MCP tool (uuid, resource_type: Finding).
For reachability tag interpretation, read references/reachability-tags.md.
Include: scanned path, detected languages, scan mode (Quick/Incremental PR), severity summary table.
Top critical/high findings table: Package, CVE, Severity, Reachability, Description.
Priority order:
/endor-fix {top-cve} - fix critical issues/endor-scan-full - full reachability analysis/endor-check {package} - check specific package/endor-explain {cve} - vulnerability detailsFor data source policy, read references/data-sources.md.
Show exact error messages — do not guess at causes. Suggest /endor-troubleshoot or /endor-setup as appropriate.
If a scan partially succeeds (e.g., dependency scan works but SAST fails), present the available results with a note about which scan types failed. Do not discard partial results.
| Error | Action |
|---|---|
| Auth error / browser opens | Complete browser login, retry. Do not bypass to CLI |
| Missing auth config | Run /endor-setup to choose an auth workflow (Local Development or Multi-Namespace). Do not add ENDOR_MCP_SERVER_AUTH_MODE if ~/.endorctl/config.yaml exists — that causes a conflict. |
| No manifest found | List supported languages |
| Scan timeout | Use fewer scan_types or scan subdirectory |
| MCP unavailable | /endor-setup. CLI fallback only if user confirms |
| Unknown error | Show exact error, suggest /endor-troubleshoot |
344e7ff
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.