Compatible with every major AI agent and IDE
Export all issues on Aikido Security
This provides a comprehensive snapshot of your organization's security posture. Use this for compliance reporting, audit preparation, or bulk analysis of vulnerabilities. Export all security issues from Aikido
Get iso compliance on Aikido Security
Shows which controls are passing, failing, or need attention. Use this for compliance monitoring, audit preparation, and security posture reporting. This endpoint is available on all paid Aikido plans. Get ISO 27001 compliance overview for your organization
Get issue group on Aikido Security
The issue group ID can be obtained from list_open_issues. Each issue group represents a category of related vulnerabilities (e.g., the same CVE across multiple repositories). Use this to deep-dive into a specific security finding before deciding on remediation steps. Get detailed information about a specific security issue group
Get soc2 compliance on Aikido Security
Shows which trust service criteria are met and which need remediation. Use this for SOC2 audit preparation and compliance monitoring. This endpoint is available on all paid Aikido plans. Get SOC2 compliance overview for your organization
Get workspace on Aikido Security
Use this to verify your workspace setup and check for any configuration errors. Get workspace information and configuration
List apps on Aikido Security
Shows which apps have active protection and their configuration status. Use this to verify your web applications are properly secured against common attacks (SQL injection, XSS, etc.). List all web applications protected by Aikido firewall
List cloud assets on Aikido Security
You can paginate through results and optionally search by text or sort by name, asset type, region, etc. Use this to understand your cloud attack surface and identify misconfigurations or vulnerabilities. List cloud infrastructure assets monitored by Aikido
List code repositories on Aikido Security
This includes repositories connected from GitHub, GitLab, Bitbucket, etc. Use this to discover which repositories are being monitored for vulnerabilities and security issues. List all active code repositories connected to Aikido
List connected clouds on Aikido Security
Shows which cloud environments are being monitored for security misconfigurations and vulnerabilities. Use this to verify cloud integrations are properly configured. List all cloud accounts connected to Aikido
List containers on Aikido Security
This includes Docker images from registries like Docker Hub, ECR, GCR, etc. Use this to monitor container security and identify vulnerable base images or dependencies. List all container images and repositories scanned by Aikido
List custom rules on Aikido Security
Custom rules allow you to define organization-specific security checks beyond the default scanner. Use this to audit your custom rule coverage and ensure your security policies are properly enforced. List all custom SAST scanning rules in Aikido
List open issues on Aikido Security
Issues include vulnerabilities from code scanning, container scanning, cloud security, SAST, IaC, DAST, and more. You can optionally filter by issue type (open_source, leaked_secret, cloud, sast, iac, docker_container, etc.), by team ID, or by repository. Supports pagination with page and per_page parameters. Use this to get a comprehensive view of your organization's security posture and prioritize remediation efforts. List all open security issues (vulnerabilities) in your Aikido account
List teams on Aikido Security
Teams are used to organize repositories, assign issues, and manage security workflows. Use this to understand how your organization structures its security responsibilities. List all teams in your Aikido organization
List users on Aikido Security
Shows user roles, permissions, and access levels. Use this to audit user access and ensure proper security team membership. List all users in your Aikido organization
List virtual machines on Aikido Security
Use this to understand your VM attack surface and identify security gaps. List all virtual machines monitored by Aikido
List webhooks on Aikido Security
Webhooks are used to send security event notifications to external systems (Slack, Jira, etc.). Use this to verify integrations are properly configured and troubleshoot notification delivery. List all configured webhooks in Aikido
How Vinkius protects your data
Is there a risk of the AI "going crazy" and deleting important company data?
No. With Vinkius, the AI operates on "rails". It can only make the exact moves you authorized in the tool's settings. It cannot invent routes, access other networks in your company, or decide to delete random files. If the action isn't in the approved catalog, the attempt is blocked instantly.
Can I audit what my AI agents are doing with this integration?
Yes, Vinkius provides an immutable, HMAC-chained audit log. Every tool execution, payload, and response is tracked in real-time on your dashboard, giving you complete visibility into your agent's actions.
What types of security issues can Aikido detect?
Aikido detects a wide range of security issues including: open source vulnerabilities (CVEs in dependencies), leaked secrets and API keys, cloud misconfigurations (AWS, GCP, Azure), SAST findings (code-level vulnerabilities), IaC issues (Terraform, CloudFormation), container vulnerabilities, DAST findings, malware detection, end-of-life dependencies, SCM security issues, and license compliance. You can filter issues by type when querying.
How does the AI access my passwords and credentials?
It simply doesn't. On Vinkius, your passwords, API keys, and login details are kept in a secure vault. The AI (like ChatGPT or Claude) merely "asks" Vinkius to perform the task. Vinkius opens the door, does the work, and hands the result back to the AI. Your credentials are never seen, read, or learned by the artificial intelligence.
How Chatbots Interact with Aikido Security
Enable conversational interfaces like ChatGPT and Claude to execute programmatic commands against the Aikido Security infrastructure.
Next-Gen code security Operations
The Aikido Security connection gives ChatGPT direct access to code security tools. The integration handles the logic required for continuous fort knox operations.
AI Semantic Routing for vulnerability management
The Aikido Security MCP integration translates natural language prompts into structured vulnerability management queries. This allows agents to fetch and update fort knox records securely.
Aikido Security. Runs on everything.
From IDE to framework. Every connection governed by Vinkius.
Anthropic's native desktop app for Claude with built-in MCP support.
AI-first code editor with integrated LLM-powered coding assistance.
GitHub Copilot in VS Code with Agent mode and MCP support.
Purpose-built IDE for agentic AI coding workflows.
Autonomous AI coding agent that runs inside VS Code.
Anthropic's agentic CLI for terminal-first development.
Python SDK for building production-grade OpenAI agent workflows.
Google's framework for building production AI agents.
Type-safe agent development for Python with first-class MCP support.
TypeScript toolkit for building AI-powered web applications.
TypeScript-native agent framework for modern web stacks.
Python framework for orchestrating collaborative AI agent crews.
Leading Python framework for composable LLM applications.
Data-aware AI agent framework for structured and unstructured sources.
Microsoft's framework for multi-agent collaborative conversations.
Explore More MCP Servers
View all →
Speechnotes
12 toolsTranscribe audio files, manage transcription jobs, and export text on Speechnotes with AI agents.

Linkup (AI Search & RAG)
2 toolsPower your AI agents with real-time web search via Linkup — execute semantic queries and extract RAG-ready content.

Mustache Template Engine
1 toolsRender logic-less Mustache templates with JSON data — the universal spec implemented in 40+ languages. Same template works in JS, Python, Go, Ruby, Rust, and Java.

Coolify
10 toolsManage self-hosting via Coolify — monitor servers, deploy applications, manage databases, and trigger builds directly from any AI agent.
