74 lines
4.9 KiB
Markdown
74 lines
4.9 KiB
Markdown
---
|
|
name: security
|
|
description: LLM Security — security scanning, auditing, and threat modeling for Claude Code projects
|
|
allowed-tools: Read, Glob
|
|
model: sonnet
|
|
---
|
|
|
|
# LLM Security Plugin
|
|
|
|
Security scanning, auditing, and threat modeling for Claude Code projects.
|
|
Based on OWASP LLM Top 10 (2025) and OWASP Agentic AI Top 10.
|
|
|
|
## Commands
|
|
|
|
| Command | Description | When to use |
|
|
|---------|-------------|-------------|
|
|
| `/security scan [path\|url]` | Scan skills, MCP servers, directories, or GitHub repos | Before installing a new skill or MCP server |
|
|
| `/security scan [path\|url] --deep` | Enhanced scan: LLM agents + 7 deterministic scanners | Deep analysis with entropy, taint, git forensics |
|
|
| `/security deep-scan [path]` | Run 7 deterministic scanners only (no LLM agents) | Fast, reproducible, deterministic-only analysis |
|
|
| `/security audit` | Full project security audit with A-F grading | Periodic review (monthly recommended) |
|
|
| `/security plugin-audit [path\|url]` | Dedicated plugin security audit with trust verdict | Before installing a third-party plugin |
|
|
| `/security mcp-audit [--live]` | Focused audit of all installed MCP servers | After adding MCP servers or on suspicion |
|
|
| `/security mcp-inspect` | Live inspection — connect to MCP servers, scan tool descriptions | Verify running servers have safe tool descriptions |
|
|
| `/security posture` | Quick security posture scorecard | Daily/weekly health check |
|
|
| `/security threat-model` | Interactive STRIDE/MAESTRO threat modeling session | When designing new architecture |
|
|
| `/security diff [path]` | Compare scan against stored baseline — shows new/resolved/moved | Track security changes over time |
|
|
| `/security watch [path] [--interval 6h]` | Monitor path continuously — runs diff on interval | Ongoing security monitoring |
|
|
| `/security clean [path]` | Clean/remediate security findings — auto-fixes, confirms semi-auto, reports manual | Sanitizing third-party plugin before install |
|
|
| `/security supply-check [path]` | Re-audit installed deps — lockfiles vs blocklists, OSV.dev CVEs, typosquats | Periodic dependency audit |
|
|
| `/security dashboard` | Cross-project security dashboard — machine-wide posture overview | Machine-wide security health check |
|
|
| `/security harden [path]` | Generate Grade A security config — settings.json, CLAUDE.md, .gitignore | Hardening a new or existing project |
|
|
| `/security red-team [--category]` | Attack simulation — test hook defenses with crafted payloads | Verify hooks actually block what they claim |
|
|
| `/security pre-deploy` | Pre-deployment security checklist | Before pushing to production |
|
|
|
|
## Quick Start
|
|
|
|
- **New to security?** Start with `/security posture` for a quick health check
|
|
- **Evaluating a plugin?** Run `/security plugin-audit path/to/plugin` for a full trust assessment
|
|
- **Inspecting live MCP servers?** Run `/security mcp-inspect` to connect and scan tool descriptions
|
|
- **Evaluating a remote plugin?** Run `/security plugin-audit https://github.com/user/repo`
|
|
- **Scanning a remote repo?** Run `/security scan https://github.com/user/repo`
|
|
- **Scanning individual files?** Run `/security scan path/to/file` for targeted analysis
|
|
- **Want deterministic analysis?** Run `/security deep-scan .` for 7 automated scanners (entropy, unicode, taint, git, deps, permissions, network)
|
|
- **Tracking changes?** Run `/security diff .` to compare against a stored baseline
|
|
- **Continuous monitoring?** Run `/security watch .` for interval-based security diffs (default 6h)
|
|
- **Full analysis?** Run `/security scan . --deep` to combine LLM + deterministic scanners
|
|
- **Sanitizing a plugin?** `/security clean path/to/plugin` — auto-fix + confirm + report
|
|
- **Hardening a project?** Run `/security harden .` to generate Grade A configuration
|
|
- **Machine-wide overview?** Run `/security dashboard` for a cross-project security dashboard
|
|
- **Testing your defenses?** Run `/security red-team` to simulate 38 attacks against your hooks
|
|
- **Heading to production?** Run `/security pre-deploy` for the checklist
|
|
- **Need deep analysis?** Run `/security threat-model` for guided threat modeling
|
|
|
|
## What's Protected (Hooks)
|
|
|
|
This plugin includes automated security hooks that run on every operation:
|
|
|
|
| Hook | Protects Against |
|
|
|------|-----------------|
|
|
| Secret detection | API keys, tokens, passwords in code |
|
|
| Path guarding | Writes to .env, .ssh, credentials files |
|
|
| Destructive command blocking | rm -rf, force push, pipe-to-shell |
|
|
| MCP output verification | Data leakage in MCP tool outputs |
|
|
|
|
These hooks are always active when the plugin is installed — no commands needed.
|
|
|
|
## Knowledge Base
|
|
|
|
Built on research-backed threat intelligence:
|
|
- OWASP LLM Top 10 (2025) — 10 LLM-specific risk categories
|
|
- OWASP Agentic AI Top 10 — Agent-specific threats (ASI01-ASI10)
|
|
- ToxicSkills study — Real-world malicious skill patterns
|
|
- MCPTox research — MCP server vulnerability patterns
|
|
- Mitigation matrix — Threat-to-control mapping for Claude Code
|