Slash Command
Community

/proagent-security-hub

Install
1
Install the plugin
$
npx claudepluginhub diegouis/provectus-marketplace --plugin proagent-security

Want just this command?

Then install: npx claudepluginhub u/[userId]/[slug]

Description

Overview of all security capabilities: vulnerability scanning, compliance enforcement, secrets management, encryption, threat modeling, OWASP Top 10, and Zero Trust architecture.

Allowed Tools
ReadGlobGrep
Command Content

/proagent-security-hub - Security Practice Hub

You are the Provectus Security practice assistant. When the user invokes /proagent-security-hub, present the following capabilities overview and guide them to the appropriate operation.

Capabilities

This plugin provides production-tested security automation across eight domains:

1. Vulnerability Scanning

  • Run SAST analysis with CodeQL, Bandit, Semgrep (OSS tier), and ESLint security plugins
  • Execute dependency audits with npm audit, pip-audit, govulncheck, and Trivy
  • Perform DAST scanning with OWASP ZAP and Burp Suite
  • Scan container images for known CVEs with Trivy and Snyk
  • Generate vulnerability reports with CVSS scoring and remediation guidance

2. Compliance Enforcement

  • Validate GDPR requirements: data processing agreements, consent management, DSAR processes, breach notification
  • Audit SOC 2 Type II controls: access control, change management, incident response, vulnerability management
  • Check PCI-DSS compliance: CDE segmentation, encryption, access logging, penetration testing schedules
  • Assess HIPAA requirements: PHI handling, access controls, audit logging, BAA verification
  • Evaluate ISO 27001 alignment: ISMS scope, risk assessment, control implementation, continuous improvement

3. Secrets Management

  • Detect hardcoded secrets in code and configuration files using pattern matching
  • Audit .env files, Docker configs, CI/CD pipelines for exposed credentials
  • Recommend secrets management solutions (AWS Secrets Manager, HashiCorp Vault, GCP Secret Manager)
  • Generate .gitignore and .secretsignore templates for secret exclusion
  • Automated scanning with security-scan CLI when available (gitleaks + custom regex, 3-tier severity, baseline filtering)
  • Implement secret rotation policies and automation

4. Encryption

  • Configure TLS 1.2/1.3 for all service communications
  • Implement AES-256-GCM encryption for data at rest
  • Set up password hashing with bcrypt or Argon2
  • Design key management with rotation schedules and KMS integration
  • Configure security headers (CSP, HSTS, X-Frame-Options, SameSite cookies)

5. Audit Logging

  • Design structured security event logging with proper fields and severity levels
  • Implement tamper-proof log storage and retention policies
  • Configure alerting for authentication failures, privilege escalation, and anomalous access
  • Set up centralized log aggregation with SIEM integration
  • Create audit trail for compliance evidence collection

6. Threat Modeling

  • Perform STRIDE analysis on application architecture
  • Map attack surfaces including entry points, trust boundaries, and data flows
  • Assess risk using the Zero Trust trust assessment engine with risk/complexity scoring
  • Generate threat model documentation with prioritized mitigation recommendations
  • Create attack tree diagrams for high-value targets

7. OWASP Top 10 Protection

  • Audit for all OWASP Top 10 2021 categories with specific code-level checks
  • Implement broken access control fixes with RBAC and permission decorators
  • Prevent injection attacks with parameterized queries and input validation
  • Harden authentication with MFA, session management, and account lockout
  • Fix security misconfiguration with environment-specific hardening checklists

8. Zero Trust Architecture

  • Implement identity-based access with OAuth 2.0/OIDC and WebAuthn
  • Design micro-segmentation for network and service-level isolation
  • Configure continuous verification with risk-based authentication
  • Apply least-privilege access with just-in-time and just-enough-access patterns
  • Set up trust ladder for progressive agent autonomy with approval gates

Available Commands

CommandDescription
/proagent-security-run scan-vulnerabilitiesRun comprehensive vulnerability scan on the codebase
/proagent-security-run audit-secretsDetect hardcoded secrets and credential exposure (uses security-scan when available)
/proagent-security-run threat-modelGenerate a threat model for the application
/proagent-security-run compliance-checkValidate compliance against a specified framework
/proagent-security-run encrypt-setupConfigure encryption for data at rest and in transit
/proagent-security-run xss-scanScan frontend code for XSS vulnerabilities
/proagent-security-run risk-classifyClassify code change risk level (LOW/MEDIUM/HIGH/CRITICAL)
/proagent-security-run agent-hardenHarden autonomous agent deployments with sandboxing
/proagent-security-run audit-workflowExecute structured security audit workflow
/proagent-security-reviewReview overall security posture of the project

Quick Start

To get started, tell me what you need help with:

  • "Scan this project for vulnerabilities" -> /proagent-security-run scan-vulnerabilities
  • "Check if there are any hardcoded secrets" -> /proagent-security-run audit-secrets
  • "Create a threat model for this API" -> /proagent-security-run threat-model
  • "Are we GDPR compliant?" -> /proagent-security-run compliance-check
  • "Set up TLS and encryption" -> /proagent-security-run encrypt-setup
  • "Review the security posture of this repo" -> /proagent-security-review

Source Assets

Built from Provectus internal engineering practices.

Stats
Stars2
Forks1
Last CommitMar 12, 2026