security-scan

安装量: 1K
排名: #1297

安装

npx skills add https://github.com/affaan-m/everything-claude-code --skill security-scan

Security Scan Skill Audit your Claude Code configuration for security issues using AgentShield . When to Activate Setting up a new Claude Code project After modifying .claude/settings.json , CLAUDE.md , or MCP configs Before committing configuration changes When onboarding to a new repository with existing Claude Code configs Periodic security hygiene checks What It Scans File Checks CLAUDE.md Hardcoded secrets, auto-run instructions, prompt injection patterns settings.json Overly permissive allow lists, missing deny lists, dangerous bypass flags mcp.json Risky MCP servers, hardcoded env secrets, npx supply chain risks hooks/ Command injection via interpolation, data exfiltration, silent error suppression agents/*.md Unrestricted tool access, prompt injection surface, missing model specs Prerequisites AgentShield must be installed. Check and install if needed:

Check if installed

npx ecc-agentshield --version

Install globally (recommended)

npm install -g ecc-agentshield

Or run directly via npx (no install needed)

npx ecc-agentshield scan . Usage Basic Scan Run against the current project's .claude/ directory:

Scan current project

npx ecc-agentshield scan

Scan a specific path

npx ecc-agentshield scan --path /path/to/.claude

Scan with minimum severity filter

npx ecc-agentshield scan --min-severity medium Output Formats

Terminal output (default) — colored report with grade

npx ecc-agentshield scan

JSON — for CI/CD integration

npx ecc-agentshield scan --format json

Markdown — for documentation

npx ecc-agentshield scan --format markdown

HTML — self-contained dark-theme report

npx ecc-agentshield scan --format html

security-report.html Auto-Fix Apply safe fixes automatically (only fixes marked as auto-fixable): npx ecc-agentshield scan --fix This will: Replace hardcoded secrets with environment variable references Tighten wildcard permissions to scoped alternatives Never modify manual-only suggestions Opus 4.6 Deep Analysis Run the adversarial three-agent pipeline for deeper analysis:

Requires ANTHROPIC_API_KEY

export ANTHROPIC_API_KEY = your-key npx ecc-agentshield scan --opus --stream This runs: Attacker (Red Team) — finds attack vectors Defender (Blue Team) — recommends hardening Auditor (Final Verdict) — synthesizes both perspectives Initialize Secure Config Scaffold a new secure .claude/ configuration from scratch: npx ecc-agentshield init Creates: settings.json with scoped permissions and deny list CLAUDE.md with security best practices mcp.json placeholder GitHub Action Add to your CI pipeline: - uses : affaan - m/agentshield@v1 with : path : '.' min-severity : 'medium' fail-on-findings : true Severity Levels Grade Score Meaning A 90-100 Secure configuration B 75-89 Minor issues C 60-74 Needs attention D 40-59 Significant risks F 0-39 Critical vulnerabilities Interpreting Results Critical Findings (fix immediately) Hardcoded API keys or tokens in config files Bash(*) in the allow list (unrestricted shell access) Command injection in hooks via ${file} interpolation Shell-running MCP servers High Findings (fix before production) Auto-run instructions in CLAUDE.md (prompt injection vector) Missing deny lists in permissions Agents with unnecessary Bash access Medium Findings (recommended) Silent error suppression in hooks ( 2>/dev/null , || true ) Missing PreToolUse security hooks npx -y auto-install in MCP server configs Info Findings (awareness) Missing descriptions on MCP servers Prohibitive instructions correctly flagged as good practice Links GitHub : github.com/affaan-m/agentshield npm : npmjs.com/package/ecc-agentshield

返回排行榜