Claude Code guide
You can access Snyk Studio in Claude Code to secure code generated with agentic workflows through an LLM. This can be achieved in several ways. When you use it for the first time, the MCP server will ask for trust and trigger authentication if necessary.
Prerequisite
Install Claude Code. For more details, visit the official Claude Code - Quickstart.
Install Snyk Studio
Install Snyk Studio using the method that best suits your operating system and local development environment. Snyk recommends leveraging the 'single command install' using npx . For different ways to install MCP servers into Claude Code, see Anthropic's official documentation.
Install with npx
npxOpen a terminal window and paste the following command:
npx -y snyk@latest mcp configure --tool=claude-cli
This command:
Downloads the latest version of Snyk's CLI.
Sets up Snyk Studio within Claude Code.
Configures Snyk Studio's Secure at inception directives within Claude Code's global rules file.

To verify installation, use the /mcp command within Claude:

Select View Tools to look at all of the commands and tooling Snyk utilizes as part of its execution The descriptions also include instructions specific for the LLM. These are capitalized to help you differentiate. These tools include:
snyk_aibom
Generates an AI Bill of Materials (AI-BOM) for Python software projects in CycloneDX v1.6 JSON format. This experimental feature analyzes local Python projects to identify AI models, datasets, tools, and other AI-related components. Requires an active internet connection and access to the experimental feature (available on request). The command must be run from within a Python project directory and requires the CLI from the preview release channel.
snyk_auth
Authenticate the user with Snyk.
snyk_code_scan
Performs Static Application Security Testing (SAST) directly from the Snyk MCP. It analyzes an application's source code with a SAST scan to identify security vulnerabilities and weaknesses without executing the code.
Supported languages:
Apex, C/C++, Dart and Flutter, Elixir, Go, Groovy, Java and Kotlin, Javascript, .NET, PHP, Python, Ruby, Rust, Scala, Swift and Objective-C, Typescript, VB.NET
snyk_container_scan
Scans container images for known vulnerabilities in OS packages and application dependencies.
snyk_iac_scan
Analyzes Infrastructure as Code (IaC) files for security misconfigurations.
Supports Terraform (.tf, .tf.json, plan files), Kubernetes (YAML, JSON), AWS CloudFormation (YAML, JSON), Azure Resource Manager (ARM JSON), and Serverless Framework.
snyk_logout
Logs the Snyk MCP out of the current Snyk account by clearing the locally stored authentication token.
snyk_sbom_scan
Experimental command. Analyzes an existing SBOM file for known vulnerabilities in its open-source components. Requires components in SBOM to be identified using PackageURLs (purls).
snyk_sca_scan
Analyzes Projects for open-source vulnerabilities and license compliance issues by inspecting manifest files (for example package.json, pom.xml, requirements.txt) to understand dependencies and then queries the Snyk vulnerability database.
snyk_send_feedback
Can be used to send feedback to Snyk.
snyk_trust
Trusts a given folder to allow Snyk to scan it.
snyk_version
Displays the installed Snyk MCP version.
Optional: Adjust scan frequency
Snyk recommends you use Snyk Studio with the Secure at inception directives, but also provides a smart scan option that allows the LLM to determine when to call Snyk Studio. This option results in lower overall token usage and faster iterating, but it increases the risk of insecure code being added to your codebase. Expand the options below for instructions on adjusting directives at installation or after installation.
Adjust at install
To utilize smart-scan from install, add the following argument to the npx install command:
npx -y snyk@latest mcp configure --tool=claude-cli --rule-type=smart-apply
Adjust after install
The default ruleset frequency can be adjusted by editing the global CLAUDE.md file.
For reference, the following are the smart apply rules Snyk places in Claude's global rules file when prompted:
Alternate installation methods
Expand the relevant method below for installation instructions.
Install with Node.js and npx
Create or edit the MCP configuration file ~/.claude.json.
If you have the Node.js npx executable installed in your environment, add the following JSON snippet to the file:
Install with Snyk CLI
Create or edit the MCP configuration file ~/.claude.json .
If you have the Snyk CLI installed and accessible on your system path, include the following JSON snippet in the file. You might need to specify the full path to the Snyk executable CLI:
If the snyk command is not available, add it by following the instructions on the Installing or updating the Snyk CLI page.
Install with Claude Code CLI commands
Run the Snyk MCP Server in sse transport mode using the Snyk CLI:
Then run the Claude Code CLI for adding a new MCP server:
Watch this step-by-step YouTube video. showing how to configure the Snyk MCP Server with Claude Code CLI.
If the snyk command is not available, add it by following the instructions on the Installing or updating the Snyk CLI page.
The following examples shows a Snyk MCP Server that was successfully configured and started.


For additional MCP configuration options on Claude Code and troubleshooting, visit the official Claude Code MCP documentation.
Authenticate the Snyk MCP Server
As a one-time setup, you need to authenticate and trust the current Project directory.

Uninstall Snyk Studio
To remove Snyk Studio and its associated ruleset from your environment, use:
Secure at inception directives
To practice Secure at Inception, Snyk recommends adopting rules that align the LLM for secure code generation and workflows.
The following is a suggested instruction for creating project rules for use with Claude Code md files. Append the following contents to the rules file at CLAUDE.md:

Last updated
Was this helpful?

