{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/4cd7882e1dfe4891a2c93bfabc82f82a\" frameborder=\"0\" width=\"1728\" height=\"1296\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1296,"width":1728,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1296,"thumbnail_width":1728,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/4cd7882e1dfe4891a2c93bfabc82f82a-e06994f471f64dc0.gif","duration":104.301,"title":"Emphere MCP: Automated Vulnerability Remediation with Claude","description":"Watch Emphere's AI security engineer scan a Node.js project, detect a high-severity vulnerability (CVE-2020-8203 in lodash), assess upgrade safety, and apply the fix, all in a single conversation.\n\n The Flow:\n  1. get_advisories → Scans npm ecosystem for CVEs affecting your dependencies\n  2. check_if_affected → Confirms your version is vulnerable\n  3. analyze_cve → Returns full remediation intelligence: breaking changes, stability, regret index, fix command\n  4. Apply & verify → Patches the vulnerability with confidence\n\n  No context switching. No manual research. No guesswork.\n\n  Emphere aggregates 15+ security sources (NVD, OSV, GitHub, CISA KEV, EPSS, community regret signals) and delivers actionable remediation decisions — not raw vulnerability data.\n\n  An AI security engineer for every developer.\n\n  Get access to the community version here: https://emphere.com/mcp"}