Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.replit.com/llms.txt

Use this file to discover all available pages before exploring further.

Project Security Center showing Agent security scan results with categorized vulnerabilities by severity
New to dependency security? See Security concepts for definitions of CVE, SBOM, exposure, Fix with Agent, Republish, and Auto-Protect.

How results are categorized

Results from both scan types appear in the Security pane, categorized by severity level:
  • Critical: Vulnerabilities that pose an immediate risk and should be addressed before publishing. Examples include remote code execution, SQL injection in exposed endpoints, and leaked credentials.
  • High: Serious issues that could be exploited under certain conditions, such as cross-site scripting (XSS), insecure authentication flows, or unpatched dependencies with known exploits.
  • Medium: Issues that represent a potential risk but are less likely to be exploitable, such as missing security headers or overly permissive CORS configurations.
  • Low / Informational: Minor issues or best-practice recommendations, such as deprecated API usage or verbose error messages in production.

What is the Project Security Center?

The Project Security Center is your project’s central hub for finding and fixing security and privacy vulnerabilities before you publish. Open the Security pane in your Project to run scans, review findings, and send accepted issues to Agent for remediation. The Project Security Center supports two types of scans:
  1. Automatic dependency scans: Free, lightweight scans that check project packages against public vulnerability records
  2. Agent security scans: AI-assisted reviews that combine model analysis with static code analysis tools to audit your entire codebase
Both scan types surface results in the same Security pane, organized by severity so you can focus on the most impactful issues first.

Automatic dependency scans

Automatic dependency scans audit the packages your project depends on against public vulnerability records. These scans are free and run automatically. When a new Common Vulnerabilities and Exposures (CVE) entry is disclosed, Replit checks it against your project’s dependencies and surfaces any matches in the Security pane — no manual re-scan needed. Dependency scanning supports Node.js/npm, Python, Go, Rust, PHP, and Ruby. For example, a scan might flag a known vulnerability in an outdated package like express@4.18.2.
The Fix all with Agent button on the Automatic dependency scans card in the Project Security Center

Auto-Protect

Auto-Protect extends automatic dependency scanning. When a matching vulnerability is detected, Replit Agent prepares and tests a patch and emails you a direct link. Auto-Protect covers dependency CVEs only — for vulnerabilities in your application code, use Agent security scans. For each new vulnerability matched against your project’s dependencies, Replit:
  1. Emails you a summary with a direct link to the affected project’s Security pane.
  2. Asks Replit Agent to prepare and test a patch that fixes the vulnerability.
  3. Leaves the patch pending your review in the Security pane.
Select Go to Task to inspect the generated changes before applying them. After you apply the patch, the vulnerability shows as pending republish until you publish a new version. Always republish after applying a patch to ensure your production app is secure. Replit sends at most one email per Workspace for each new vulnerability. The email summarizes all affected projects in that Workspace. Admins can set the minimum severity that triggers Auto-Protect — for example, critical only.

Enable Auto-Protect

Both Auto-Protect settings are off by default. Enabling Auto-Protect requires two settings: one admin-only setting that authorizes Replit to prepare patches, and one personal setting that controls whether you receive emails about new vulnerabilities.
1

Enable patch preparation (admin only)

Go to Settings > Account > Advanced and select the minimum severity (low, medium, high, or critical) at which Replit should automatically prepare remediations. Setting a higher threshold means Replit only prepares patches for the most serious vulnerabilities.
2

Enable security emails

Go to Settings > Personalization > Email Notifications and select the minimum severity at which you want to be notified about new security issues. High or critical is typical.
Agent-prepared remediations are billed like any other Agent work, even when prepared proactively by Auto-Protect.

Agent security scans

Agent security scans go beyond dependency checks to perform a comprehensive audit of your entire codebase. Security Agent combines model-based review with static analysis tools like Semgrep and HoundDog.ai to find vulnerabilities that pattern-matching alone would miss. Agent security scans are available to all paid Replit builders. For larger projects, a deep audit can take up to 15 minutes to ensure a thorough assessment.

What Security Agent does

When you start an Agent security scan, Security Agent performs a full review of your codebase:
  1. Maps your architecture — identifies routes, APIs, data flows, and entry points
  2. Builds a threat model — creates a customizable threat modeling plan for your application
  3. Runs static analysis — uses Semgrep and HoundDog.ai to scan for code-level vulnerabilities and privacy issues
  4. Analyzes findings with AI — evaluates whether flagged issues are actually exploitable in your application’s context, significantly reducing false positives
  5. Generates a findings report — presents identified risks for your review
Agent security scans cover a broad range of vulnerability categories:
  • Static analysis (SAST) issues: Insecure code patterns like SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)
  • Privacy issues: Sensitive data flowing into risky sinks like logs, files, or third-party APIs
  • Architectural vulnerabilities: Security gaps in how your routes, APIs, and data flows are structured
For example, the review might flag an unparameterized database query:
const query = `SELECT * FROM users WHERE username = '${userInput}'`;
Or code that logs sensitive user data:
logger.info("New signup", {
  email: user.email,
  phoneNumber: user.phoneNumber,
  address: user.address,
});

Starting an Agent security scan

1
Open the Security pane in your Project to launch the Project Security Center.
The Review security button in the project's Publish flow, which opens the Security pane
2
Select Run scan with Agent.
The Run scan with Agent button highlighted in the Project Security Center
3
Optionally customize the threat modeling prompt to focus on specific areas of your application.
The Scan options popover with an Add context field for narrowing the scan to specific areas of the project
4
Wait for the review to complete. This typically takes a few minutes, but can take up to 15 minutes for larger projects.
After the review completes, Security Agent generates a report of identified risks. You can review the vulnerability details, dismiss findings you understand and are willing to accept, or revise findings before sending them for remediation. After you review the findings, send accepted issues to Replit Agent for remediation. Security Agent organizes vulnerabilities into separate tasks so Agent can work on multiple fixes in parallel. After fixes are applied, run another scan to confirm the issues are resolved. After you fix the first set of findings, run another scan. Larger projects may reveal additional issues once higher-severity findings are resolved.

Limitations and best practices

  • Privacy and data handling: All scanning runs on Replit infrastructure. Your code and data are not sent to Semgrep, HoundDog.ai, or other third parties. Scan configuration and results stay attached to your Replit App.
  • Language support:
    • Dependency scanning supports many popular ecosystems (including Node.js/npm, Python, Go, Rust, PHP, and Ruby).
    • Automatic dependency fixing is currently focused on Node.js/npm.
  • Not a full security review: Use scans alongside code review, tests, dependency review, and live app checks.
  • Re-run after changes: Run a scan again after:
    • Adding or updating dependencies
    • Making major code changes
    • Before publishing a new version

Publish checks

The Block publishing of critical vulnerabilities setting lives in the Deploy tab’s Advanced settings (and the Redeploy flow). Replit always runs a security scan before publishing; this toggle decides what happens when the scan finds a critical-severity issue:
  • On — publishing is blocked until the issue is resolved or dismissed.
  • Off — publishing proceeds and the finding is surfaced for you to review.
Turn this on to make sure nothing critical ships without your review. Organizations on enterprise plans can require this setting for every app.
This setting used to be labeled “Security scan before publishing” and carried a Beta tag. It’s now out of Beta and renamed to make the behavior clearer — the scan itself always runs either way.

Next steps