Github Copilot

The Aikido MCP Server connects Aikido’s security engine to AI coding tools that support MCParrow-up-right. It automatically scans AI generated code for vulnerabilities and hardcoded secrets as soon as it is created.

AI assistants can review their own output, but that review is not perfect. Aikido adds a reliable and consistent security layer that checks every generated snippet with proven scanning rules.

Why connect Aikido via MCP

  • Deterministic, independent security checks on every AI generated snippet before it is committed

  • Immediate detection and remediation of vulnerabilities and hardcoded secrets in AI assisted workflows

  • Real time feedback inside your IDE or agent environment, making AI driven development safer by default

Available Tools

  • aikido_full_scan: Runs a combined SAST + Secrets scan on provided files.

  • aikido_sast_scan: Runs a local SAST (static application security testing) scan on provided files

  • aikido_secrets_scan: Runs a secrets-only scan on provided files

Installation

IDE

The Aikido VSCode IDE plugin uses Expansion Packs to provide additional features. The Aikido MCP for Github Copilot is one of these Expansion Packs, making installation simple and fast without a separate setup process. See the linked page below for instructions on how to enable it.

VS Code IDEchevron-right

Integration with Copilot Agents

GitHub Copilot coding agent can call tools from MCP servers while it runs. Follow the steps below to set up Aikido MCP for your repository. Configuration is done per repository.

If you already use Aikido MCP in VS Code, you can reuse that configurationarrow-up-right and only add the token in your repository settings.

Set-up Instructions

circle-info

For the full GitHub flow (where to paste JSON, how validation works, and how Copilot environments expose secrets), check out GitHub’s guidearrow-up-right.

1

Create an Aikido MCP token

In Aikido, go to MCP Integration pagearrow-up-right and create a Personal Access Token.

2

Add the token to your Copilot environment

Github Copilot only exposes secrets/variables to MCP config if their names start with COPILOT_MCP_

Create a secret like:

COPILOT_MCP_AIKIDO_API_KEY = your Aikido token

3

Add the MCP configuration in your repo settings

In your GitHub repository, go to Settings → Copilot → Coding agent and paste an MCP JSON config.

Example configuration for Aikido MCP (local/stdio via npx):

4

Add custom prompt instructions

To ensure GitHub Copilot uses the MCP server, configure repository instructions as described in the GitHub guidearrow-up-right.

Add an instruction such as:

5

Validate

You can now verify your configurationarrow-up-right by asking Copilot to security scan one of your files.

Last updated

Was this helpful?