Available tools
| Tool | Description |
|---|---|
analyzePlan | Analyze a planned code implementation and get relevant security context from your project’s guardrails |
getFindings | Retrieve security findings with filters for state (open/closed/potential), severity, and limit |
getFinding | Get detailed info about a specific finding including description, affected code, and remediation guidance |
updateFindingState | Mark findings as closed (false positive, risk accepted, fixed) or reopen them |
getGuardrails | Get security guardrails and context documents for a project |
createGuardrail | Create new security guardrails programmatically |
listProjects | List all Corridor projects you have access to |
analyzePlan
TheanalyzePlan tool is the core tool that AI coding assistants call before generating code. It takes a description of what you plan to implement and returns relevant security context from your project’s guardrails and context documents. This helps prevent vulnerabilities by giving the AI assistant project-specific security guidance at the point of code generation.
Parameters:
| Parameter | Type | Required | Description |
|---|---|---|---|
plan | string | Yes | Description of what you plan to implement or the user request you are working on |
cwd | string | No | Absolute path to the current working directory of the workspace |
branch | string | No | Current git branch name |
commit_hash | string | No | Current git commit hash |
has_unstaged_changes | boolean | No | Whether there are uncommitted changes in the working directory |
Example conversation
- “Add a new API endpoint” → calls
analyzePlanfor security context before writing code - “Show me details about finding X” → calls
getFinding - “Mark this finding as a false positive” → calls
updateFindingState - “What guardrails should I follow?” → calls
getGuardrails - “Create a guardrail for SQL injection prevention” → calls
createGuardrail
Requirements
- Corridor extension installed and authenticated
- MCP enabled for your team (team setting)
- IDE Extension Support entitlement on your plan
- User must be a member of a team that owns the project
Security notes
- Tools validate team membership before granting access
- Uniform 404 responses prevent information leakage
- Admin operations reject API tokens (require user auth)
Next steps
Findings
Track and remediate security issues
Guardrails
Configure security guardrails