DEV Community

Michael Moreira
Michael Moreira

Posted on

I built a CI/CD tool that auto-heals broken pipelines, runs 6 security scans, and works from your IDE via MCP

Your CI/CD pipeline breaks at 2 AM. You wake up, debug logs, fix YAML, redeploy, and pray it works.

What if AI could do all of that in 30 seconds while you sleep?

That's why I built FlowEasy — an AI-powered CI/CD pipeline generator with built-in DevSecOps, auto-healing, and IDE integration via MCP.

🔧 Auto-Heal AI

When a pipeline fails, FlowEasy AI:

  • Reads the logs and identifies the root cause
  • Commits a fix directly or opens a PR for your review
  • Re-runs the pipeline automatically

It handles lockfile issues, config errors, dependency problems, and code fixes. Average fix time: under 30 seconds.

🖥️ MCP Server — CI/CD Inside Your IDE

FlowEasy ships an MCP server (floweasy-mcp) with 9 tools. From Claude Code, Cursor, or Windsurf, you can:

  • List pipelines and check status
  • View logs and analyze failures
  • Re-run, rollback, or cancel deploys
  • Generate compliance reports

Setup is one line in your config:

{
  "mcpServers": {
    "floweasy": {
      "command": "npx",
      "args": ["-y", "floweasy-mcp"]
    }
  }
}
Enter fullscreen mode Exit fullscreen mode

🛡️ 6 Security Scans on Every Deploy

Every pipeline run includes:

  • SAST — Semgrep with 847+ rules
  • SCA — npm audit for dependency vulnerabilities
  • Secrets — TruffleHog scanning for leaked credentials
  • DAST — OWASP ZAP running against your live app
  • SBOM — Syft for software bill of materials
  • Compliance — audit-ready reports

Zero extra config. Security is the default, not an add-on.

How It Works

  1. Connect your GitHub repo
  2. Choose your security gates and deploy targets
  3. FlowEasy generates the GitHub Actions YAML and commits it

No manual YAML writing. Works with Next.js, Node, Python, and more.

Stack

GitHub Actions, Vercel, Semgrep, TruffleHog, OWASP ZAP, Syft.


Try it free at floweasy.dev — no credit card required.

I'd love to hear your feedback. What security scans do you run in your pipelines today?

Top comments (0)