Automatically analyzes every Pull Request for security vulnerabilities — reports posted directly on the PR.
| Vulnerability | Description |
|---|---|
| SQL Injection | Raw SQL built from user input, string concatenation in queries |
| XSS | Unescaped user input in HTML, dangerouslySetInnerHTML, innerHTML |
| Command Injection | User input passed to exec(), spawn(), eval(), or shell commands |
| Path Traversal | User input used in file paths without sanitization |
- Developer opens a Pull Request
- Fixor receives the PR webhook from GitHub
- Analyzes the diff using Claude AI
- Posts a detailed security report directly on the PR
- Node.js 18+
- GitHub Token with
reposcope - Anthropic API Key
git clone https://github.com/tornidomaroc-web/fixor.git
cd fixor
npm install
cp .env.example .env| Variable | Description |
|---|---|
GITHUB_TOKEN |
GitHub personal access token |
ANTHROPIC_API_KEY |
Anthropic API key |
GITHUB_WEBHOOK_SECRET |
Webhook secret (optional but recommended) |
PORT |
Server port (default: 3000) |
DRY_RUN |
Set to true to preview without posting |
npm run build
node dist/server/webhook-server.jssrc/
analysis-engine/ # AI-powered vulnerability detection
integrations/
github/ # GitHub webhook handler, PR comments, API client
services/ # Fix generation, risk explanation, diff analysis
types/ # Shared TypeScript types
workflows/ # Auditor workflow orchestration
- Runtime: Node.js + TypeScript
- AI Engine: Claude (claude-sonnet-4-20250514)
- Integration: GitHub Webhooks API
- Security: HMAC-SHA256 webhook signature verification
PRs are welcome. See CONTRIBUTING.md.
MIT © 2025 Fixor