Skip to content
| Marketplace
Sign in
Visual Studio Code>Linters>FLCN Security — Credential & Vulnerability GuardNew to Visual Studio Code? Get it now.
FLCN Security — Credential & Vulnerability Guard

FLCN Security — Credential & Vulnerability Guard

The Falcon

|
2 installs
| (0) | Free
Real-time credential detection and redaction. Protects against leaking API keys, tokens, and secrets to AI coding assistants.
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

FLCN Security — Credential & Vulnerability Guard

Real-time protection against leaking secrets, API keys, and vulnerable dependencies to AI coding assistants and public repositories.


Features

Credential Detection

  • Real-time scanning — underlines detected credentials as you edit, with inline diagnostics
  • 20 built-in detectors — covers all major cloud providers and services (AWS, OpenAI, Anthropic, GitHub, Stripe, GCP, and more)
  • Quick-fix actions — redact a credential or suppress with an inline comment in one click
  • Warn on open / save — alerts whenever a file containing credentials is opened or saved
  • Redact file — replaces every detected credential in the active file with [REDACTED:Kind]

Dependency Vulnerability Scanning

  • OSV.dev — queries the Open Source Vulnerabilities database for all dependency manifests
  • GitHub Security Advisories (GHSA) — queries the GitHub Advisory Database directly for same-day CVE coverage
  • NVD (NIST) — queries the National Vulnerability Database for CVEs not yet in OSV
  • npm audit — runs npm audit locally for Node.js projects; catches advisories the moment they are published
  • Supports package.json, requirements.txt, Cargo.toml, Gemfile, and go.mod
  • Configurable scan interval (default: every 60 minutes) and auto-scan on project open
  • Results shown inline in the Problems panel and in the dedicated FLCN Security panel

Security Dashboard

  • Open with FLCN Sec: Open Security Dashboard or click the status bar item
  • Live Issues — credential and vulnerability cards at the top, updated in real time
  • Settings controls — toggle every option without leaving VS Code
  • Loading progress — per-scanner status ("Scanning GHSA…", "Scanning NVD…") while scans run

FLCN Security Panel

  • Dedicated tab in the bottom panel (alongside Output and Terminal)
  • Problems-panel style — credentials and vulnerabilities in collapsible sections
  • Click a credential row to jump to the file and line
  • Click a vulnerability ID to open the advisory in your browser

Git Pre-commit Hook

  • Installs a pre-commit hook that blocks commits containing credentials
  • Manage from the dashboard or via command palette

AI Context Exclusions

  • Writes .cursorignore and disables Copilot for .env, *.pem, SSH keys, and other sensitive file types
  • Applied automatically when a sensitive file is first opened

Built-in Detectors

Detector Pattern
Anthropic API Key sk-ant-api03-…
OpenAI API Key sk-proj-…
AWS Access Key ID AKIAIOSFODNN7EXAMPLE
AWS Secret Access Key aws_secret_access_key = …
GitHub Token ghp_…, gho_…, ghs_…
Slack Token xoxb-…, xoxp-…
Stripe Secret Key sk_live_…, rk_test_…
Google API Key AIzaSy…
JSON Web Token eyJ…
PEM Private Key -----BEGIN … PRIVATE KEY-----
GCP Service Account JSON with "type": "service_account"
HuggingFace Token hf_…
npm Token npm_…
Docker Hub PAT dckr_pat_…
SendGrid API Key SG.…
DigitalOcean Token dop_v1_…
Databricks Token dapi…
Azure Storage Key AccountKey=…
MongoDB Connection String mongodb://user:password@…
Env-style Secret Assignment MY_TOKEN=abc123…

Commands

Command Description
FLCN Sec: Open Security Dashboard Open the dashboard editor tab
FLCN Sec: Scan Current File for Credentials One-shot scan with results notification
FLCN Sec: Redact All Credentials in File Replace every detected credential
FLCN Sec: Open Redacted View Open a safe copy alongside the real file
FLCN Sec: Toggle Real-time Scanning Enable / disable live diagnostics
FLCN Sec: Show Findings Log Open the output channel
FLCN Sec: Scan Dependencies for Vulnerabilities Trigger a manual vulnerability scan
FLCN Sec: Install Git Pre-commit Hook Install the hook in the current workspace
FLCN Sec: Uninstall Git Pre-commit Hook Remove the hook
FLCN Sec: Exclude Sensitive Files from AI Write .cursorignore and Copilot settings

Settings

Credential Guard

Setting Default Description
flcn-sec.enableRealTimeScan true Scan as you type
flcn-sec.warnOnOpen true Alert when a file with credentials is opened
flcn-sec.warnOnSave true Alert when saving a file with credentials
flcn-sec.severity "error" Diagnostic level: "error" or "warning"
flcn-sec.maxFileSizeKb 512 Skip files larger than this (KB)
flcn-sec.excludeFilePatterns see docs Glob patterns for files to skip entirely
flcn-sec.customDetectors [] Add regex-based detectors for your own secrets
flcn-sec.allowlist [] Suppress specific findings by value, line, file, or detector
flcn-sec.disabledDetectors [] Disable specific built-in detectors by name

Vulnerability Scanning

Setting Default Description
flcn-sec.osv.enabled true Enable OSV.dev scanning
flcn-sec.osv.scanOnOpen true Scan automatically when the workspace opens
flcn-sec.osv.scanIntervalMinutes 60 Re-scan interval (0 = disabled)
flcn-sec.osv.blockSeverity "HIGH" Show as error at or above this severity
flcn-sec.ghsa.enabled true Enable GitHub Security Advisories scanning
flcn-sec.github.token "" GitHub PAT for higher GHSA rate limits
flcn-sec.nvd.enabled true Enable NVD (NIST) CVE scanning
flcn-sec.nvd.apiKey "" NVD API key for higher rate limits
flcn-sec.npmAudit.enabled true Enable npm audit for Node.js projects

Custom Detectors

"flcn-sec.customDetectors": [
  {
    "name": "MyApp Token",
    "pattern": "myapp_[A-Za-z0-9]{32}",
    "flags": "g"
  },
  {
    "name": "DB Password",
    "pattern": "DB_PASSWORD\\s*=\\s*(\\S{12,})",
    "flags": "gim",
    "group": 1
  }
]

Allowlist

Suppress known-safe findings without disabling the detector:

"flcn-sec.allowlist": [
  {
    "description": "Placeholder values in docs",
    "valuePattern": "^(YOUR_|REPLACE_ME|example|placeholder)",
    "detectorName": "Env-style Secret Assignment"
  },
  {
    "description": "JWTs in test fixtures are fake",
    "detectorName": "JSON Web Token",
    "filePattern": "**/*.test.*"
  }
]

Claude Code Integration

FLCN Sec ships with a companion Claude Code hooks plugin that adds hook-level protection to the Claude Code CLI:

  • UserPromptSubmit — blocks prompts containing credentials before they reach the model
  • PreToolUse — redacts credentials from file reads and bash output; hard-blocks writes containing secrets; scans package install commands (pip, npm, cargo, gem) against OSV/GHSA/NVD before executing
  • PostToolUse — alerts if a credential slipped through in a tool result

See the companion hooks/ directory for setup instructions.


License

GNU Affero General Public License v3.0

Any project that uses, modifies, or builds on FLCN Security must also be released as open source under the AGPL v3 (or a compatible license). This includes projects that expose the extension's functionality over a network.

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft