Logs, traces, traffic — ask in plain English.

Chat With Your Live App.
Zero Bugs. Zero Hackers.

Ask your production app anything. “Any bugs today?” “Block this hacker.” “What's failing?”One npm install. Then just talk.

Built for vibecoders who ship fast and don't want to think about security. Powered by Claude.

you → your-appLIVE

Hey, any bugs in production right now?

Found 3 errors in the last hour. The main one: TypeError at checkout.js:147 — started after your last deploy.

Is anyone trying to hack us?

47 SQL injection attempts from a Tor exit node. Already blocked it. You're safe.

WHY VIBECODERS LOVE IT

Ship Vibes, Not Vulnerabilities

You handle the features. SecureNow handles everything that can go wrong in production — automatically.

0

Bugs in Production

AI watches every request. When something breaks, you get a root cause analysis before your users even notice. Ask "what's failing?" and get an instant answer.

0

Hackers Getting Through

SQL injections, brute force, credential stuffing — all detected and blocked automatically. Ask "who's attacking us?" and see every attempt with full forensics.

0

Bots Scraping Your App

Bot fingerprinting, rate limiting, and IP intelligence — all working 24/7. Ask "any suspicious traffic?" and get a full breakdown of who's hitting your endpoints.

Just Ask

"Why is /checkout failing?" — plain English, real answers from your production data.

Zero Config

One npm install. Auto-captures every request, log, and trace. No YAML. No middleware.

AI Has Your Back

An AI agent monitors 24/7 — blocks threats, diagnoses errors, alerts your team.

Block With a Word

"Block that IP" — done. Blocked across all your apps, instantly.

Ship Faster

Stop context-switching to dashboards. Debug and secure from your terminal or IDE.

Cursor-Native

Paste one prompt. Claude sets up everything — login, config, env vars — automatically.

WHAT YOU CAN DO

Talk to Your App Like a Teammate

Every question becomes a CLI command. Every answer comes from your real production data. Here's what you can ask.

Not a CLI freak? Every command is one click away in the web dashboard too.

“Any bugs in production?”

Find and fix errors before users complain

$ securenow logs --level error --minutes 60

$ securenow traces analyze abc123

[AI] TypeError at checkout.js:147 — null cart after v2.4.1 deploy

$ securenow forensics "errors on /api/checkout since 2pm"

“Block this hacker”

Investigate and block threats in seconds

$ securenow ip lookup 185.220.101.34

Verdict: MALICIOUS · Tor exit node · AbuseIPDB 100%

$ securenow blocklist add 185.220.101.34

IP blocked across all apps

“Look into this guy's requests”

Trace any user or IP across your entire app

$ securenow ip traces 91.242.18.2

12 requests · /api/login (8x), /api/users (4x)

$ securenow traces show def456

[AI] Brute force pattern — 8 failed logins in 30 seconds

“Block any suspicious attacks”

Set up automated protection and alerts

$ securenow forensics "SQL injections today"

67 attempts from 4 IPs detected

$ securenow alerts rules

5 active rules · Slack #security · auto-block enabled

CLAUDE + SECURENOW CLI

Claude Orchestrates. You Relax.

Inside Cursor, Claude chains multiple CLI commands together to fully investigate and resolve issues — without you typing a single command.

Claude in Cursor · using SecureNow CLI

My app feels off today. Can you check if there are any errors or attacks and handle it?

Let me investigate your production environment.

Step 1: Check for errors

$ securenow logs --level error --minutes 120 --json

Found 23 errors — 19x TypeError on /api/checkout

Step 2: Analyze root cause

$ securenow traces analyze a1b2c3 --json

[AI] Null reference on cart.items — started after deploy v3.2.0

Step 3: Check for attacks

$ securenow forensics "injection attempts today" --json

31 SQL injection attempts from 185.220.101.34

Step 4: IP intelligence

$ securenow ip lookup 185.220.101.34 --json

Verdict: MALICIOUS · Tor exit · AbuseIPDB 100%

Step 5: Block + Alert

$ securenow blocklist add 185.220.101.34

IP blocked across all apps

Here's the summary:

Bug found: TypeError in checkout.js:147 — null cart after v3.2.0 deploy. I'd add a null check on cart.items.
Attacker blocked: 185.220.101.34 (Tor exit, 31 injection attempts) — now blocked.
Your app is secure. No other threats detected. Alert rules are active.

Users say checkout is slow. Find the slowest endpoints and tell me why.

Pulling traces from the last hour and ranking by latency.

Step 1: List slow traces

$ securenow traces list --slow --minutes 60 --json

Top offender: POST /api/checkout · p95 4,210ms (baseline 320ms)

Step 2: Drill into slowest trace

$ securenow traces show tr_9f2c --json

DB query `orders.find({user})` took 3.9s — missing index on user_id

Step 3: Correlate with deploy

$ securenow deploys recent --json

[AI] Slowdown started 12m after deploy v4.1.0 — matches migration 0041

Step 4: Set SLA alert

$ securenow alerts add "checkout p95 > 1s"

Alert armed · notifies #eng-oncall on Slack

Here's the summary:

Root cause: Missing index on orders.user_id after migration 0041 — add index_user_id.
Impact: Checkout p95 13x baseline, affecting ~38% of sessions in the last hour.
Guardrail: Alert now fires if p95 > 1s so you catch the next regression instantly.

Someone's hammering /api/upload with weird payloads. Show me exactly what they sent.

Digging into the raw request bodies and multipart uploads.

Step 1: Find suspicious requests

$ securenow logs path=/api/upload --status 4xx,5xx --minutes 30

47 requests · 41 from 91.242.18.2 · 6 unique filenames

Step 2: Inspect request body

$ securenow logs show req_7a1b --body --json

multipart/form-data · file="shell.php.jpg" · 2.1MB · mime mismatch

Step 3: Scan payload with AI

$ securenow forensics scan req_7a1b --ai

[AI] PHP webshell signature detected in bytes 0-128 — CVE-2023-xxxx pattern

Step 4: Block + audit trail

$ securenow blocklist add 91.242.18.2 --reason webshell

IP blocked · 41 related requests exported to audit.log

Here's the summary:

Attack type: PHP webshell upload disguised as .jpg (mime mismatch) — classic RCE attempt.
Contained: Attacker IP blocked, all 41 related requests captured with full bodies for audit.
Recommendation: Enforce server-side mime sniffing on /api/upload — I can open a PR if you want.

This customer says the app crashed on them. Trace everything they did today.

Rebuilding the full session timeline for user u_482.

Step 1: Pull user timeline

$ securenow users timeline u_482 --today --json

42 requests · 3 errors · session started 09:14 from Chrome/macOS

Step 2: Find the crash

$ securenow logs user=u_482 --level error

09:47 · 500 on POST /api/cart/apply-coupon · code=COUPON_NULL

Step 3: Replay request with body

$ securenow logs show req_cf12 --body --headers

body: {"code":""} · empty string coupon triggered unhandled path

Step 4: Impact check

$ securenow traces search "COUPON_NULL" --days 7

217 users hit the same path · 0 reported · silent bug

Here's the summary:

Crash cause: Empty-string coupon code isn't validated — server throws on `coupon.trim()`.
Hidden blast radius: 217 other users hit the same bug this week. None complained — they just churned.
Fix suggested: Guard empty coupons in cart controller — single-line fix, I can draft it.

Are bots scraping my signup endpoint? Set something up to stop them.

Looking for automation signals on /api/signup.

Step 1: Traffic fingerprint

$ securenow logs path=/api/signup --group-by ua --minutes 60

83% of traffic shares 1 UA · no cookies · no JS challenge solved

Step 2: AI bot verdict

$ securenow forensics bots /api/signup --ai

[AI] Headless Chrome fleet · 14 /24 subnets · likely credential stuffing

Step 3: Check for breach

$ securenow forensics "failed logins today" --top-ips

4,812 failed logins · 92% from flagged subnets

Step 4: Enable bot shield

$ securenow shield enable --path /api/signup --mode strict

Shield active · auto-challenge + rate limit on flagged fingerprints

Here's the summary:

Attack confirmed: Credential-stuffing botnet from 14 subnets using headless Chrome.
Mitigated: Shield armed on /api/signup — bots now challenged, humans pass through.
Next: I'll alert you if the same fingerprints touch /api/login too.

Auto-playing · hover to pause

5 CLI commands. 1 conversation. 0 effort.

Claude uses --json output to chain forensics → traces → IP lookup → blocklist → alerts

Try It Free
GET STARTED IN 2 MINUTES

One Prompt. Done.

Paste this into Cursor Agent and let Claude handle everything. You only need to click one OAuth login button.

1

Install the package

npm install securenow

2

Log in locally — for your current project

$ npx securenow login

Opens your browser for OAuth · scoped to this project only.

The only step that needs you. Everything after this is automated by Claude.

3

Paste this prompt into Cursor

Cursor Agent Prompt
The SecureNow npm package lives at https://www.npmjs.com/package/securenow — fetch that page if you need the latest docs, version, or README. Read the @node_modules/securenow package — look at register.js, tracing.js, cli.js, and the .d.ts type files to understand all config. I've already run `npx securenow login` locally. Now set up SecureNow in my project end-to-end: 1. Run `npx securenow apps create` to register my app (use my project name, pick default instance). 2. Run `npx securenow apps list --json` to get my APPID & INSTANCE. 3. Create .env using those values: SECURENOW_APPID=<from step 2> SECURENOW_INSTANCE=<from step 2> SECURENOW_LOGGING_ENABLED=1 SECURENOW_CAPTURE_BODY=1 SECURENOW_NO_UUID=1 SECURENOW_TEST_SPAN=1 4. Create .env.example with placeholder values. 5. Ensure .env and .env.local are in .gitignore. 6. Add `-r securenow/register` to my start script in package.json. 7. Run `npx securenow status` to verify the connection. Do all of this automatically — I'm already logged in.
4

Ship it. You're protected.

$ npm start

SecureNow: Connected. Tracing active. You're protected.

# Now ask your app anything:

$ securenow forensics "any errors right now?"

Works with Express, Fastify, NestJS, Koa, Hapi, Next.js, and 5 more frameworks

Start Free
UNDER THE HOOD

One Install. Everything Covered.

Observe
Real-time request traces
Structured log forwarding
API endpoint discovery
Response analytics
Investigate
AI trace analysis
Natural-language forensics
IP intelligence + geo
Full request replay
Respond
Auto-block malicious IPs
Custom alert rules
Slack, email, webhooks
Automation workflows
Integrate
CLI with --json output
Cursor / Claude native
11 Node.js frameworks
PM2, Docker, serverless
FAQ

Vibecoders Ask, We Answer

Code on screen

Your App Deserves a Bodyguard.

One npm install. Then just ask — "any bugs?" "who's attacking us?" "block that IP." Your production app, protected by AI.

Start Chatting — Free