<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: INDERPREET THIARA</title>
    <description>The latest articles on DEV Community by INDERPREET THIARA (@inderpreet_thiara_90072c0).</description>
    <link>https://dev.to/inderpreet_thiara_90072c0</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2326059%2F5945638f-9de9-4086-bc96-e55d1c89461c.jpg</url>
      <title>DEV Community: INDERPREET THIARA</title>
      <link>https://dev.to/inderpreet_thiara_90072c0</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/inderpreet_thiara_90072c0"/>
    <language>en</language>
    <item>
      <title>TridentChain Security</title>
      <dc:creator>INDERPREET THIARA</dc:creator>
      <pubDate>Sun, 24 May 2026 12:27:10 +0000</pubDate>
      <link>https://dev.to/inderpreet_thiara_90072c0/tridentchain-security-3dh6</link>
      <guid>https://dev.to/inderpreet_thiara_90072c0/tridentchain-security-3dh6</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/github-2026-05-21"&gt;GitHub Finish-Up-A-Thon Challenge&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;TridentChain Security&lt;/strong&gt; — a local-first supply-chain vulnerability scanner that finds known CVEs in your project dependencies, OS packages, and IDE extensions using &lt;strong&gt;OSV&lt;/strong&gt; and &lt;strong&gt;NVD&lt;/strong&gt; advisory data, all running on your machine with no source code uploaded anywhere.&lt;/p&gt;

&lt;p&gt;It started life as a personal CLI I built to sanity-check &lt;code&gt;package.json&lt;/code&gt; and &lt;code&gt;requirements.txt&lt;/code&gt; files before pushing to production. I was tired of pasting lockfiles into web-based scanners and worrying about where that data went. So I wrote my own, scoped it tight, and… let it gather dust for months because it was a "me-only" tool with no integration story.&lt;/p&gt;

&lt;p&gt;What changed: AI coding assistants exploded in 2026, and every one of them speaks &lt;strong&gt;MCP&lt;/strong&gt; (Model Context Protocol). I realised the scanner could become a &lt;em&gt;primitive&lt;/em&gt; every developer could use directly from Claude, Cursor, VS Code, Windsurf, or Zed — if only it shipped as an MCP server.&lt;/p&gt;

&lt;p&gt;So that's what I finished.&lt;/p&gt;

&lt;h2&gt;
  
  
  Demo
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/DevInder1/supply-chain-scanner-public" rel="noopener noreferrer"&gt;https://github.com/DevInder1/supply-chain-scanner-public&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PyPI (CLI):&lt;/strong&gt; &lt;a href="https://pypi.org/project/tridentchain-security/" rel="noopener noreferrer"&gt;https://pypi.org/project/tridentchain-security/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PyPI (MCP):&lt;/strong&gt; &lt;a href="https://pypi.org/project/tridentchain-mcp/0.1.2/" rel="noopener noreferrer"&gt;https://pypi.org/project/tridentchain-mcp/0.1.2/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Official MCP Registry listing:&lt;/strong&gt; &lt;code&gt;io.github.DevInder1/tridentchain-security&lt;/code&gt; at &lt;a href="https://registry.modelcontextprotocol.io" rel="noopener noreferrer"&gt;https://registry.modelcontextprotocol.io&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Verify it's live:&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
bash
  curl "https://registry.modelcontextprotocol.io/v0.1/servers?search=tridentchain"

![ ](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/8vrejicw83qfaubl8l52.png)
![ ](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/svfcwq3vhzj3ukb6zz6s.png)


pip install "tridentchain-security&amp;gt;=0.1.2" "tridentchain-mcp&amp;gt;=0.1.2"
claude mcp add tridentchain -- python3 -m tridentchain_mcp
# Then in Claude: "Scan this workspace for supply-chain vulnerabilities."
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>devchallenge</category>
      <category>githubchallenge</category>
    </item>
  </channel>
</rss>
