Full port of llm-security plugin for internal use on Windows with GitHub Copilot CLI. Protocol translation layer (copilot-hook-runner.mjs) normalizes Copilot camelCase I/O to Claude Code snake_case format — all original hook scripts run unmodified. - 8 hooks with protocol translation (stdin/stdout/exit code) - 18 SKILL.md skills (Agent Skills Open Standard) - 6 .agent.md agent definitions - 20 scanners + 14 scanner lib modules (unchanged) - 14 knowledge files (unchanged) - 39 test files including copilot-port-verify.mjs (17 tests) - Windows-ready: node:path, os.tmpdir(), process.execPath, no bash Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1.9 KiB
1.9 KiB
| name | description |
|---|---|
| security-deep-scan | Run deterministic deep-scan — 10 Node.js scanners for Unicode attacks, entropy analysis, permission mapping, dependency auditing, taint tracing, git forensics, network mapping, memory poisoning, supply chain recheck, and toxic flow analysis |
Deep Scan
10 deterministic Node.js scanners — entropy, Unicode, typosquatting, git forensics, taint tracing, dep audit, network mapping, memory poisoning, supply chain recheck, toxic flow analysis.
Step 1: Setup
- If
$ARGUMENTSis empty, target = current working directory. Otherwise target =$ARGUMENTS(strip--deepif present). - Create a temporary file path for results (e.g. using
node -p "require('path').join(require('os').tmpdir(), 'deep-scan-results.json')").
Step 2: Run Orchestrator
node <plugin-root>/scanners/scan-orchestrator.mjs "<target>" --output-file "<results_file>"
Exit codes: 0=ALLOW, 1=WARNING, 2=BLOCK. Stdout = compact aggregate JSON. Full results in file.
Step 3: Show Banner
## Deep Scan: [VERDICT]
Risk Score: X/100 | Findings: XC XH XM XL XI
Scanners: X ok, X error, X skipped
Step 4: Synthesize Report
Read the full results from <results_file>. Also read <plugin-root>/knowledge/mitigation-matrix.md for remediation context.
Produce a complete report with:
- Executive Summary — 3-5 sentences: posture assessment, dominant issue themes, intent assessment
- Per-Scanner Details — Group findings by severity (CRITICAL first). Highlight important findings, explain implications.
- Toxic Flow Analysis — If toxic-flow findings exist, show the trifecta chain legs (Input, Access, Exfil) with evidence
- Recommendations — Prioritized by urgency. Include finding IDs and actionable fix steps.
- OWASP Coverage — Map findings to OWASP LLM Top 10 and Agentic AI Top 10 categories.
Do NOT invent findings. Do NOT downplay CRITICAL or HIGH severity issues.