Aikido-Security-Analysis-Platform
Security analysis platform for Aiken smart contracts on Cardano: 75 detectors, SMT verification, transaction simulation
claude mcp add --transport stdio bajuzjefe-aikido-security-analysis-platform npx -y aikido-aiken
How to use
Aikido is a multi-lane security analysis platform for Aiken smart contracts on Cardano. It combines a detector suite with formal SMT verification, transaction simulation, compliance checks, protocol pattern detection, and grammar-aware fuzzing to surface vulnerabilities automatically. The tool produces findings with source context, severity ratings, CWE/CWC classifications, and actionable remediation guidance, and supports multiple output formats such as terminal, JSON, SARIF, Markdown, HTML, PDF, CSV, and GitLab SAST. Practically, you point Aikido at your Aiken project and it runs a comprehensive, cross-validated analysis across detectors, compliance rules, and simulated transactions to corroborate findings across techniques, giving you a consolidated report with evidence references.
To use the server, install the CLI wrapper (via npm/npx) or run via Docker or from source as described in the installation guide, then invoke aikido on your Aiken project directory. The tool will return a structured report showing critical issues first, followed by high, medium, and low findings. You can then export the results to your preferred format for integration into your review workflow or CI/CD pipeline. The platform’s multi-lane approach helps you verify findings across different analysis methods, reducing false positives and increasing confidence before deploying to mainnet.
How to install
Prerequisites:
- Rust toolchain (1.88.0 or newer) installed
- Optional: Docker if you prefer containerized runs
- Optional: Node.js/npm for npx wrapper
Install paths (choose one):
- Using the npm wrapper (recommended for quick starts):
- Prerequisite: Node.js and npm installed
# Install the npm-based wrapper via npx (no global install required)
# You can run directly without installing anything globally
# Example usage shown in the Quick Start: npx aikido-aiken /path/to/project
- Install via Cargo (Rust) and build from source:
# Install via cargo (Rust >= 1.88.0)
cargo install --git https://github.com/Bajuzjefe/Aikido-Security-Analysis-Platform aikido-cli
# Run the CLI after installation, e.g.:
#aikido /path/to/your-aiken-project
- Docker (containerized):
# Run with your project mounted into the container
# Replace /path/to/project with your actual project path
docker run --rm -v $(pwd):/project ghcr.io/bajuzjefe/aikido:0.3.1 /project
- From source (build locally):
git clone https://github.com/Bajuzjefe/Aikido-Security-Analysis-Platform.git
cd aikido && cargo build --release
Additional notes
Tips and caveats:
- The tool supports multiple output formats; use SARIF/JSON for integration with CI dashboards and code reviews.
- Ensure your Rust toolchain matches or exceeds the minimum version (1.88.0) used in the project to avoid build issues.
- If you encounter false positives, leverage the multi-lane analysis concept by re-running with different inputs or adjusting fuzzing/SMT options if available.
- For Docker runs, ensure the project path is correctly mounted and that file permissions allow analysis of your Aiken project.
- The npm/npx pathway is convenient for quick analyses and does not require a global install; you can run it as a one-off command.
- Check the audit comparison and ecosystem validation sections of the README for context on detector coverage and real-world validation.
Related MCP Servers
mcp-checkpoint
MCP Checkpoint continuously secures and monitors Model Context Protocol operations through static and dynamic scans, revealing hidden risks in agent-to-tool communications.
code-pathfinder
AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights and supports MCP
slither
MCP server for Slither static analysis of Solidity smart contracts
ironcurtain
A secure* runtime for autonomous AI agents. Policy from plain-English constitutions. (*https://ironcurtain.dev)
mcp-security-audit
A powerful MCP (Model Context Protocol) Server that audits npm package dependencies for security vulnerabilities. Built with remote npm registry integration for real-time security checks.
MCPHammer
MCP security testing framework for evaluating Model Context Protocol server vulnerabilities