Bring Application Security
to AutoGen
Learn how to connect HCL AppScan to AutoGen and start using 10 AI agent tools in minutes. Fully managed, enterprise secure, and ready to use without writing a single line of code.
What is the HCL AppScan MCP Server?
The HCL AppScan MCP Server brings powerful application security testing capabilities directly to your AI agent. Seamlessly manage your security posture by monitoring vulnerabilities, tracking scan progress, and auditing your application inventory across HCL AppScan on Cloud (ASoC).
Key Features
- Inventory Management — List and search for applications in your security inventory to find their unique IDs.
- Vulnerability Tracking — Retrieve detailed lists of security issues found during scans, including severity and status.
- Scan Oversight — Monitor all performed scans and check the real-time status of active security tests.
- Dynamic Analysis (DAST) — Start new DAST scans for your web applications directly from your chat interface.
- Agent & Presence Monitoring — List available Presences (local agents) used for scanning internal applications.
- Real-time Insights — Get instant summaries of your security findings and prioritize remediation efforts.
Who is this for?
- Security Engineers — Quickly audit security findings across multiple applications without manual dashboard exports.
- DevSecOps Teams — Integrate security scan monitoring and initiation into your automated workflows.
- Compliance Officers — Monitor application security status and ensure all apps are regularly scanned.
Built-in capabilities (10)
Verify AppScan account connection
Retrieve authenticated user information
Get details for a specific application
Get detailed information about a specific vulnerability
Get details and status for a specific scan
List all applications in your AppScan inventory
List vulnerabilities found for a specific application
List AppScan Presences (local agents)
List all scans performed in the account
Start a new Dynamic Analysis (DAST) scan
Why AutoGen?
AutoGen enables multi-agent conversations where agents negotiate, delegate, and collaboratively use HCL AppScan tools. Connect 10 tools through Vinkius and assign role-based access. a data analyst queries while a reviewer validates, with optional human-in-the-loop approval for sensitive operations.
- —
Multi-agent conversations: multiple AutoGen agents discuss, delegate, and collaboratively use HCL AppScan tools to solve complex tasks
- —
Role-based architecture lets you assign HCL AppScan tool access to specific agents. a data analyst queries while a reviewer validates
- —
Human-in-the-loop support: agents can pause for human approval before executing sensitive HCL AppScan tool calls
- —
Code execution sandbox: AutoGen agents can write and run code that processes HCL AppScan tool responses in an isolated environment
HCL AppScan in AutoGen
HCL AppScan and 3,400+ other MCP servers. One platform. One governance layer.
Teams that connect HCL AppScan to AutoGen through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.
Raw MCP | Vinkius | |
|---|---|---|
| Server catalog | Find and host yourself | 3,400+ managed |
| Infrastructure | Self-hosted | Sandboxed V8 isolates |
| Credential handling | Plaintext in config | Vault + runtime injection |
| Data loss prevention | None | Configurable DLP policies |
| Kill switch | None | Global instant shutdown |
| Financial circuit breakers | None | Per-server limits + alerts |
| Audit trail | None | Ed25519 signed logs |
| SIEM log streaming | None | Splunk, Datadog, Webhook |
| Honeytokens | None | Canary alerts on leak |
| Custom domains | Not applicable | DNS challenge verified |
| GDPR compliance | Manual effort | Automated purge + export |
Why teams choose Vinkius for HCL AppScan in AutoGen
The HCL AppScan MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 10 tools execute in hardened sandboxes optimized for native MCP execution.
Your AI agents in AutoGen only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure
How Vinkius secures
HCL AppScan for AutoGen
Every tool call from AutoGen to the HCL AppScan MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.
Frequently asked questions
How do I get my AppScan API Key ID and Secret?
Log in to the AppScan on Cloud console, go to your User Profile (top right), and select API Keys. You can generate a new Key ID and Key Secret there.
Does this server support the EU region?
Yes, you can configure the APPSCAN_REGION environment variable to eu to connect to the European data center (eu.cloud.appscan.com).
Can I start a scan for an internal application?
Yes, provided you have an AppScan Presence (local agent) configured. You can use the list_presence tool to check their availability before starting a scan.
How does AutoGen connect to MCP servers?
Create an MCP tool adapter and assign it to one or more agents in the group chat. AutoGen agents can then call HCL AppScan tools during their conversation turns.
Can different agents have different MCP tool access?
Yes. AutoGen's role-based architecture lets you assign specific MCP tools to specific agents, so a querying agent has different capabilities than a reviewing agent.
Does AutoGen support human approval for tool calls?
Yes. Configure human-in-the-loop mode so agents pause and request approval before executing sensitive MCP tool calls.
McpWorkbench not found
Install: pip install "autogen-ext[mcp]"
