Generate HTML security reports from Trivy, pip-audit, Bandit, and Gitleaks JSON
Project description
sec-report-kit
Generate HTML vulnerability reports from Trivy, pip-audit, Bandit, and Gitleaks JSON with a CLI and MCP server.
Install
pip install -e .
With MCP support:
pip install -e .[mcp]
CLI Usage
Both commands are available:
srksec-report-kit
Render Trivy JSON:
srk render trivy --input security_reports/trivy-image-report-v1.0.21.json --output security_reports/report-trivy.html --target shankonduru/cpkc-poc:v1.0.21
Render pip-audit JSON:
srk render pip-audit --input pip-audit.json --output security_reports/report-pip-audit.html --target requirements.txt
Helper Scripts (bat/sh)
Cross-platform helper scripts are available in scripts/.
Install this package and pip-audit:
# Linux/macOS
bash scripts/install_tools.sh
# Windows
scripts\install_tools.bat
Run all unit tests locally with coverage:
# Linux/macOS (optional arg: <coverage_dir>)
bash scripts/run_unit_tests_with_coverage.sh
bash scripts/run_unit_tests_with_coverage.sh htmlcov
# Windows (optional arg: <coverage_dir>)
scripts\run_unit_tests_with_coverage.bat
scripts\run_unit_tests_with_coverage.bat htmlcov
Run pip-audit and write JSON output:
# Linux/macOS (optional args: <report_dir> <requirements_file>)
bash scripts/run_pip_audit.sh
bash scripts/run_pip_audit.sh reports requirements.txt
# Windows (optional args: <report_dir> <requirements_file>)
scripts\run_pip_audit.bat
scripts\run_pip_audit.bat reports requirements.txt
Convert pip-audit JSON report to HTML:
# Linux/macOS (optional args: <report_dir> <target_name>)
bash scripts/render_pip_audit_html.sh
bash scripts/render_pip_audit_html.sh reports requirements.txt
# Windows (optional args: <report_dir> <target_name>)
scripts\render_pip_audit_html.bat
scripts\render_pip_audit_html.bat reports requirements.txt
These render helpers generate the HTML file and open it automatically in your default browser.
Convert sample Trivy JSON report to HTML:
# Linux/macOS (optional args: <report_dir> <target_name>)
bash scripts/render_trivy_html.sh
bash scripts/render_trivy_html.sh security_reports my-image
# Windows (optional args: <report_dir> <target_name>)
scripts\render_trivy_html.bat
scripts\render_trivy_html.bat security_reports my-image
Convert sample Bandit JSON report to HTML:
# Linux/macOS (optional args: <report_dir> <target_name>)
bash scripts/render_bandit_html.sh
bash scripts/render_bandit_html.sh security_reports my-python-project
# Windows (optional args: <report_dir> <target_name>)
scripts\render_bandit_html.bat
scripts\render_bandit_html.bat security_reports my-python-project
Convert sample Gitleaks JSON report to HTML:
# Linux/macOS (optional args: <report_dir> <target_name>)
bash scripts/render_gitleaks_html.sh
bash scripts/render_gitleaks_html.sh security_reports my-repository
# Windows (optional args: <report_dir> <target_name>)
scripts\render_gitleaks_html.bat
scripts\render_gitleaks_html.bat security_reports my-repository
By default, JSON is written to reports/pip-audit.json and HTML to reports/pip-audit-report.html.
Render Bandit JSON:
srk render bandit --input bandit-report.json --output security_reports/report-bandit.html --target my-python-project
Render Gitleaks JSON:
srk render gitleaks --input gitleaks-report.json --output security_reports/report-gitleaks.html --target my-repository
MCP Server
Run MCP server over stdio:
srk mcp serve --transport stdio
Available MCP Tools
| Tool | Description |
|---|---|
summarize_json |
Summarize vulnerabilities by severity from a JSON file |
render_report_from_json |
Parse JSON and render an HTML report to disk |
validate_input |
Validate that a JSON file is parseable and return finding count |
All tools accept source_type ("trivy", "pip-audit", "bandit", "gitleaks", or "auto") and input_path (absolute path to JSON file).
VS Code (GitHub Copilot Agent / MCP extension)
Add to your VS Code settings.json (or .vscode/mcp.json in the workspace):
{
"mcp": {
"servers": {
"sec-report-kit": {
"type": "stdio",
"command": "srk",
"args": ["mcp", "serve", "--transport", "stdio"]
}
}
}
}
Note: If
srkis not on the system PATH, replace"command"with the full path to the executable, e.g."C:/Users/you/.venv/Scripts/srk.exe".
Claude Desktop
Edit %APPDATA%\Claude\claude_desktop_config.json (Windows) or ~/Library/Application Support/Claude/claude_desktop_config.json (macOS):
{
"mcpServers": {
"sec-report-kit": {
"command": "srk",
"args": ["mcp", "serve", "--transport", "stdio"]
}
}
}
Cursor
Open Cursor Settings → MCP and add a new server entry:
{
"sec-report-kit": {
"command": "srk",
"args": ["mcp", "serve", "--transport", "stdio"]
}
}
Or add it to .cursor/mcp.json in your project root:
{
"mcpServers": {
"sec-report-kit": {
"command": "srk",
"args": ["mcp", "serve", "--transport", "stdio"]
}
}
}
Windsurf (Codeium)
Edit ~/.codeium/windsurf/mcp_config.json:
{
"mcpServers": {
"sec-report-kit": {
"command": "srk",
"args": ["mcp", "serve", "--transport", "stdio"]
}
}
}
Using a virtual environment
If the package is installed in a .venv, use the full path to avoid PATH issues:
Windows:
{
"command": "C:/MyProjects/sec-report-kit/.venv/Scripts/srk.exe",
"args": ["mcp", "serve", "--transport", "stdio"]
}
macOS / Linux:
{
"command": "/home/user/sec-report-kit/.venv/bin/srk",
"args": ["mcp", "serve", "--transport", "stdio"]
}
Package Publish
Build:
python -m build
Upload to TestPyPI:
python -m twine upload --repository testpypi dist/*
Upload to PyPI:
python -m twine upload dist/*
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file sec_report_kit-0.1.9.tar.gz.
File metadata
- Download URL: sec_report_kit-0.1.9.tar.gz
- Upload date:
- Size: 16.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
11561321889831e7fff7c7720ae499c64a8228fb2e6011f5f83ff34c1acb2733
|
|
| MD5 |
36cf0b68cafac7e67a648225947d4497
|
|
| BLAKE2b-256 |
2804ae360e37dca751ce4784d8eed7494cda21301db30543a2d798d4366364c1
|
Provenance
The following attestation bundles were made for sec_report_kit-0.1.9.tar.gz:
Publisher:
publish-pypi.yml on ShanKonduru/sec-report-kit
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
sec_report_kit-0.1.9.tar.gz -
Subject digest:
11561321889831e7fff7c7720ae499c64a8228fb2e6011f5f83ff34c1acb2733 - Sigstore transparency entry: 1449166409
- Sigstore integration time:
-
Permalink:
ShanKonduru/sec-report-kit@dbf0fa5140b92ac3f1d83c84d329623829744fde -
Branch / Tag:
refs/tags/v0.1.9 - Owner: https://github.com/ShanKonduru
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@dbf0fa5140b92ac3f1d83c84d329623829744fde -
Trigger Event:
push
-
Statement type:
File details
Details for the file sec_report_kit-0.1.9-py3-none-any.whl.
File metadata
- Download URL: sec_report_kit-0.1.9-py3-none-any.whl
- Upload date:
- Size: 14.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
83a68920d54e03144eca230bc00ed3ccc144fb56e560e22cd2be203910c067a6
|
|
| MD5 |
3abf26d4ec8145b538c50004add2334b
|
|
| BLAKE2b-256 |
7ea8c5ab4250fee2e70f67134990a60744687a882c1100f20415f5aeed119f1f
|
Provenance
The following attestation bundles were made for sec_report_kit-0.1.9-py3-none-any.whl:
Publisher:
publish-pypi.yml on ShanKonduru/sec-report-kit
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
sec_report_kit-0.1.9-py3-none-any.whl -
Subject digest:
83a68920d54e03144eca230bc00ed3ccc144fb56e560e22cd2be203910c067a6 - Sigstore transparency entry: 1449166421
- Sigstore integration time:
-
Permalink:
ShanKonduru/sec-report-kit@dbf0fa5140b92ac3f1d83c84d329623829744fde -
Branch / Tag:
refs/tags/v0.1.9 - Owner: https://github.com/ShanKonduru
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@dbf0fa5140b92ac3f1d83c84d329623829744fde -
Trigger Event:
push
-
Statement type: