Skip to main content

Musha Security Documentation

Musha is an all-in-one security scanner for modern dev teams — SCA, IaC, and Secrets detection in a single platform. Webhook-based, zero-agent, API-first.


What Musha detects

ScannerWhat it finds
SCA (Software Composition Analysis)Vulnerable dependencies in Go, Node.js, Python, Rust, Ruby, PHP, Java, .NET
IaC (Infrastructure as Code)Misconfigurations in Terraform, CloudFormation, and Kubernetes manifests
SecretsHardcoded credentials, API keys, and tokens committed to source code

Where to start


How it works (short version)

  1. You push code → your CI pipeline calls POST /v1/scans with the changed files.
  2. Musha runs SCA + IaC + Secrets analysis using the secplat engine.
  3. Findings appear in the Security dashboard and as a PR comment with a pass/fail status.
  4. Your team triages, assigns, and tracks vulnerabilities until resolved.

For a deeper dive, see How it works.


Need help?

Email support@mushasec.com and include your X-Request-ID from any failed API response — it lets us find the exact request in our logs immediately.