New standalone scanner (prefix IDE) discovers installed VS Code extensions across forks (Cursor, Windsurf, VSCodium, code-server, Insiders, Remote-SSH) and runs 7 IDE-specific threat checks: blocklist match (CRITICAL), theme-with-code, sideload (unsigned .vsix), dangerous uninstall hook (HIGH), wildcard activation, extension-pack expansion, typosquat (MEDIUM). Per-extension reuse of UNI/ENT/NET/TNT/MEM/SCR scanners with bounded concurrency. Offline-first; --online opt-in. JetBrains discovery stubbed for v1.1. 22 new tests (1296 total, was 1274). Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
5.2 KiB
5.2 KiB
| name | description | allowed-tools | model |
|---|---|---|---|
| security | LLM Security — security scanning, auditing, and threat modeling for Claude Code projects | Read, Glob | sonnet |
LLM Security Plugin
Security scanning, auditing, and threat modeling for Claude Code projects. Based on OWASP LLM Top 10 (2025) and OWASP Agentic AI Top 10.
Commands
| Command | Description | When to use |
|---|---|---|
/security scan [path|url] |
Scan skills, MCP servers, directories, or GitHub repos | Before installing a new skill or MCP server |
/security scan [path|url] --deep |
Enhanced scan: LLM agents + 7 deterministic scanners | Deep analysis with entropy, taint, git forensics |
/security deep-scan [path] |
Run 7 deterministic scanners only (no LLM agents) | Fast, reproducible, deterministic-only analysis |
/security audit |
Full project security audit with A-F grading | Periodic review (monthly recommended) |
/security plugin-audit [path|url] |
Dedicated plugin security audit with trust verdict | Before installing a third-party plugin |
/security mcp-audit [--live] |
Focused audit of all installed MCP servers | After adding MCP servers or on suspicion |
/security mcp-inspect |
Live inspection — connect to MCP servers, scan tool descriptions | Verify running servers have safe tool descriptions |
/security ide-scan [target] |
Scan installed VS Code / JetBrains extensions for supply-chain risk, typosquats, malicious patterns | After installing new extensions or periodic review |
/security posture |
Quick security posture scorecard | Daily/weekly health check |
/security threat-model |
Interactive STRIDE/MAESTRO threat modeling session | When designing new architecture |
/security diff [path] |
Compare scan against stored baseline — shows new/resolved/moved | Track security changes over time |
/security watch [path] [--interval 6h] |
Monitor path continuously — runs diff on interval | Ongoing security monitoring |
/security clean [path] |
Clean/remediate security findings — auto-fixes, confirms semi-auto, reports manual | Sanitizing third-party plugin before install |
/security supply-check [path] |
Re-audit installed deps — lockfiles vs blocklists, OSV.dev CVEs, typosquats | Periodic dependency audit |
/security dashboard |
Cross-project security dashboard — machine-wide posture overview | Machine-wide security health check |
/security harden [path] |
Generate Grade A security config — settings.json, CLAUDE.md, .gitignore | Hardening a new or existing project |
/security red-team [--category] |
Attack simulation — test hook defenses with crafted payloads | Verify hooks actually block what they claim |
/security pre-deploy |
Pre-deployment security checklist | Before pushing to production |
Quick Start
- New to security? Start with
/security posturefor a quick health check - Evaluating a plugin? Run
/security plugin-audit path/to/pluginfor a full trust assessment - Inspecting live MCP servers? Run
/security mcp-inspectto connect and scan tool descriptions - Installed IDE extensions? Run
/security ide-scanto audit VS Code / Cursor / Windsurf extensions - Evaluating a remote plugin? Run
/security plugin-audit https://github.com/user/repo - Scanning a remote repo? Run
/security scan https://github.com/user/repo - Scanning individual files? Run
/security scan path/to/filefor targeted analysis - Want deterministic analysis? Run
/security deep-scan .for 7 automated scanners (entropy, unicode, taint, git, deps, permissions, network) - Tracking changes? Run
/security diff .to compare against a stored baseline - Continuous monitoring? Run
/security watch .for interval-based security diffs (default 6h) - Full analysis? Run
/security scan . --deepto combine LLM + deterministic scanners - Sanitizing a plugin?
/security clean path/to/plugin— auto-fix + confirm + report - Hardening a project? Run
/security harden .to generate Grade A configuration - Machine-wide overview? Run
/security dashboardfor a cross-project security dashboard - Testing your defenses? Run
/security red-teamto simulate 38 attacks against your hooks - Heading to production? Run
/security pre-deployfor the checklist - Need deep analysis? Run
/security threat-modelfor guided threat modeling
What's Protected (Hooks)
This plugin includes automated security hooks that run on every operation:
| Hook | Protects Against |
|---|---|
| Secret detection | API keys, tokens, passwords in code |
| Path guarding | Writes to .env, .ssh, credentials files |
| Destructive command blocking | rm -rf, force push, pipe-to-shell |
| MCP output verification | Data leakage in MCP tool outputs |
These hooks are always active when the plugin is installed — no commands needed.
Knowledge Base
Built on research-backed threat intelligence:
- OWASP LLM Top 10 (2025) — 10 LLM-specific risk categories
- OWASP Agentic AI Top 10 — Agent-specific threats (ASI01-ASI10)
- ToxicSkills study — Real-world malicious skill patterns
- MCPTox research — MCP server vulnerability patterns
- Mitigation matrix — Threat-to-control mapping for Claude Code