Configuration
The Igris Scanner supports extensive configuration for scanner behavior, rule management, and suppression of known false positives.Scanner Configuration (.igrisrc)
Place an .igrisrc file in your project root. The CLI searches the current directory and all ancestors.
Options
| Field | Type | Default | Description |
|---|---|---|---|
severity | string | "low" | Minimum severity to report |
format | string | "table" | Output format: table, json, sarif |
fail-on | string | "high" | Exit 1 if findings at this level or above |
verbose | boolean | false | Show full finding details and remediation |
color | boolean | true | Enable ANSI colored output |
timeout | number | 30000 | Per-detector timeout in milliseconds |
rules.disabled | string[] | [] | Rule IDs to skip entirely |
rules.config | object | {} | Per-rule configuration overrides |
suppressions | array | [] | Active suppression rules |
plugins | string[] | [] | Paths to custom detector plugins |
Suppressions
Suppressions mark findings as acknowledged without fixing them. Suppressed findings still appear in results but are flagged assuppressed: true and don’t affect the exit code.
Suppression Fields
| Field | Required | Description |
|---|---|---|
rule | Yes | Rule ID to suppress (e.g., AG-CRD-002) |
serverName | No | Only suppress for this specific server |
reason | Yes | Why this finding is suppressed (for audit trail) |
expires | No | ISO 8601 date — suppression auto-expires after this date |
Disabling Rules
To permanently skip certain rules, add their IDs to thedisabled list:
--disable CLI flag:
AG-CRD disables all credential scanner rules.
Supported MCP Config Formats
The scanner parses and normalizes configs from all major MCP clients:| Format | Example File | Key Differences |
|---|---|---|
| Claude Desktop | claude_desktop_config.json | { mcpServers: { ... } } |
| Claude Code | .mcp.json | { mcpServers: { ... } } |
| Cursor | .cursor/mcp.json | { mcpServers: { ... } } |
| VS Code | .vscode/mcp.json | { servers: { ... } } or { mcpServers: { ... } } |
| Zed | settings.json | MCP config nested under lsp settings |
| Windsurf | mcp_config.json | { mcpServers: { ... } } |
| Generic | mcp.json | Auto-detected format |
| YAML | mcp.yaml | YAML variant of any of the above |
McpConfig structure before scanning, so detectors work identically regardless of which client created the config.
MCP Server Config Fields
Each server entry can contain:Programmatic API
Use the Igris Scanner as a library in your own tools:Custom Detectors
Implement theDetector interface to add custom rules: