Mobb Vulnerabilities Fixer
Scan, fix, and remediate security vulnerabilities in a local code repository using Mobb MCP/CLI.
- Rating
- 4.6 (19 reviews)
- Downloads
- 2,811 downloads
- Version
- 1.0.0
Overview
Scan, fix, and remediate security vulnerabilities in a local code repository using Mobb MCP/CLI.
Complete Documentation
View Source →
Mobb Vulnerabilities Fixer
Overview
Use Mobb MCP scan-and-fix behavior to identify security issues in a local repo and apply the generated patches. Follow the MCP workflow exactly, including file selection, pagination, and rescan rules.Workflows
Scan and Fix (default)
- Confirm target repository path.
. and a workspace root is known, use it.
- Ensure Mobb authentication is available.
API_KEY in the environment. If missing or invalid, inform the user a browser window will open for Mobb login and authorization, then proceed once authenticated. If the user has no account, instruct them to create one and generate an API key. See references/mobb-auth.md.
- Require MCP to be already running.
- Execute MCP scan-and-fix.
scan_and_fix_vulnerabilities with the repository path. Use optional parameters only when the user explicitly asks.Required parameter:
path: absolute path to the repository root
offset: pagination offset for additional fixeslimit: maximum number of fixes to return (default is 3)maxFiles: scan up to N recently changed files (default is 10); setting this triggers a fresh scanrescan: force a full rescan; only when user explicitly asksscanRecentlyChangedFiles: when true and no git changes are found, scan recently changed files from history- Apply returned fixes only with explicit user consent.
- Never auto-rescan or auto-page.
Fetch Available Fixes (summary only)
Use when the user wants a summary of available fixes without uploading/scanning or applying patches.
Call fetch_available_fixes with:
path: absolute path to the repo rootoffsetandlimit: optional paginationfileFilter: optional list of relative paths to filter fixesfetchFixesFromAnyFile: optional boolean to fetch fixes for all files
fileFilter and fetchFixesFromAnyFile are mutually exclusive. If neither is provided, the tool filters to files with git status changes.Check for New Available Fixes (monitoring)
Call check_for_new_available_fixes once at the end of a session after edits/tests, or when the user explicitly asks to check for fresh fixes.
Behavior notes:
- Requires a local git repo with an
originremote. - If auto-fix is enabled, fixes may be applied automatically; tell the user to review and commit changes.
- It may return "initial scan in progress" or "no fresh fixes" depending on timing.
File Selection Rules (scan_and_fix_vulnerabilities)
- If the path is a valid git repo, scan only changed/staged files by default.
- If no changes are found and
scanRecentlyChangedFilesis true (ormaxFilesis set), scan recently changed files from git history. - If not a git repo, scan recently changed files in the directory.
- Exclude files larger than 5 MB.
No-Changes Case
If no changed files are detected, explain the situation and offer a follow-up scan usingscanRecentlyChangedFiles and/or maxFiles, but do not run it unless explicitly requested.Resources
references/mcp-scan-fix.md: MCP scan-and-fix, fetch, and monitoring tool detailsreferences/mobb-auth.md: authentication and login flow details
Installation
openclaw install mobb-vulnerabilities-fixer
Tags
Quick Info
Ready to Install?
Get started with this skill in seconds
Related Skills
4claw
4claw — a moderated imageboard for AI agents.
Aap Passport
Agent Attestation Protocol - The Reverse Turing Test.
Adaptive Suite
A continuously adaptive skill suite that empowers Clawdbot.
Adversarial Prompting
Adversarial analysis to critique, fix.