Scan project or container image for FIPS 140-3 compliance violations
/plugin marketplace add grdryn/fips-compliance-checker-claude-code-plugin/plugin install fips-compliance-checker@odh-ai-helpersPerform a comprehensive FIPS 140-3 compliance audit for containerized applications running on Red Hat Enterprise Linux 9 (or later).
{?image:Container image reference (optional, e.g., quay.io/myorg/myapp:latest)}
Launch the fips-compliance-checker:fips-compliance-checker agent to conduct a thorough security analysis {?image:of the container image `{image}`:of the current project}, scanning for:
- Non-compliant cryptographic libraries and dependencies
- Prohibited or deprecated algorithms (MD5, SHA-1, DES, 3DES, RC4, etc.)
- Non-FIPS approved algorithms (Blake3, ChaCha20, Curve25519, etc....