Bring Application Security
to LangChain
Learn how to connect HCL AppScan to LangChain and start using 10 AI agent tools in minutes. Fully managed, enterprise secure, and ready to use without writing a single line of code.
What is the HCL AppScan MCP Server?
The HCL AppScan MCP Server brings powerful application security testing capabilities directly to your AI agent. Seamlessly manage your security posture by monitoring vulnerabilities, tracking scan progress, and auditing your application inventory across HCL AppScan on Cloud (ASoC).
Key Features
- Inventory Management — List and search for applications in your security inventory to find their unique IDs.
- Vulnerability Tracking — Retrieve detailed lists of security issues found during scans, including severity and status.
- Scan Oversight — Monitor all performed scans and check the real-time status of active security tests.
- Dynamic Analysis (DAST) — Start new DAST scans for your web applications directly from your chat interface.
- Agent & Presence Monitoring — List available Presences (local agents) used for scanning internal applications.
- Real-time Insights — Get instant summaries of your security findings and prioritize remediation efforts.
Who is this for?
- Security Engineers — Quickly audit security findings across multiple applications without manual dashboard exports.
- DevSecOps Teams — Integrate security scan monitoring and initiation into your automated workflows.
- Compliance Officers — Monitor application security status and ensure all apps are regularly scanned.
Built-in capabilities (10)
Verify AppScan account connection
Retrieve authenticated user information
Get details for a specific application
Get detailed information about a specific vulnerability
Get details and status for a specific scan
List all applications in your AppScan inventory
List vulnerabilities found for a specific application
List AppScan Presences (local agents)
List all scans performed in the account
Start a new Dynamic Analysis (DAST) scan
Why LangChain?
LangChain's ecosystem of 500+ components combines seamlessly with HCL AppScan through native MCP adapters. Connect 10 tools via Vinkius and use ReAct agents, Plan-and-Execute strategies, or custom agent architectures. with LangSmith tracing giving full visibility into every tool call, latency, and token cost.
- —
The largest ecosystem of integrations, chains, and agents. combine HCL AppScan MCP tools with 500+ LangChain components
- —
Agent architecture supports ReAct, Plan-and-Execute, and custom strategies with full MCP tool access at every step
- —
LangSmith tracing gives you complete visibility into tool calls, latencies, and token usage for production debugging
- —
Memory and conversation persistence let agents maintain context across HCL AppScan queries for multi-turn workflows
HCL AppScan in LangChain
HCL AppScan and 3,400+ other MCP servers. One platform. One governance layer.
Teams that connect HCL AppScan to LangChain through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.
Raw MCP | Vinkius | |
|---|---|---|
| Server catalog | Find and host yourself | 3,400+ managed |
| Infrastructure | Self-hosted | Sandboxed V8 isolates |
| Credential handling | Plaintext in config | Vault + runtime injection |
| Data loss prevention | None | Configurable DLP policies |
| Kill switch | None | Global instant shutdown |
| Financial circuit breakers | None | Per-server limits + alerts |
| Audit trail | None | Ed25519 signed logs |
| SIEM log streaming | None | Splunk, Datadog, Webhook |
| Honeytokens | None | Canary alerts on leak |
| Custom domains | Not applicable | DNS challenge verified |
| GDPR compliance | Manual effort | Automated purge + export |
Why teams choose Vinkius for HCL AppScan in LangChain
The HCL AppScan MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 10 tools execute in hardened sandboxes optimized for native MCP execution.
Your AI agents in LangChain only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure
How Vinkius secures
HCL AppScan for LangChain
Every tool call from LangChain to the HCL AppScan MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.
Frequently asked questions
How do I get my AppScan API Key ID and Secret?
Log in to the AppScan on Cloud console, go to your User Profile (top right), and select API Keys. You can generate a new Key ID and Key Secret there.
Does this server support the EU region?
Yes, you can configure the APPSCAN_REGION environment variable to eu to connect to the European data center (eu.cloud.appscan.com).
Can I start a scan for an internal application?
Yes, provided you have an AppScan Presence (local agent) configured. You can use the list_presence tool to check their availability before starting a scan.
How does LangChain connect to MCP servers?
Use langchain-mcp-adapters to create an MCP client. LangChain discovers all tools and wraps them as native LangChain tools compatible with any agent type.
Which LangChain agent types work with MCP?
All agent types including ReAct, OpenAI Functions, and custom agents work with MCP tools. The tools appear as standard LangChain tools after the adapter wraps them.
Can I trace MCP tool calls in LangSmith?
Yes. All MCP tool invocations appear as traced steps in LangSmith, showing input parameters, response payloads, latency, and token usage.
MultiServerMCPClient not found
Install: pip install langchain-mcp-adapters
