From harness-claude
Lightweight mechanical security scan for health checks
npx claudepluginhub intense-visions/harness-engineering --plugin harness-claude[--path <path>] [--severity <severity>] [--changed-only <changed-only>]commands/<!-- Generated by harness generate-slash-commands. Do not edit. --> <context> Cognitive mode: meticulous-implementer Type: rigid </context> <objective> Lightweight mechanical security scan for health checks Phases: - scan: Run SecurityScanner and filter by severity threshold </objective> <execution_context> @agents/skills/claude-code/harness-security-scan/SKILL.md @agents/skills/claude-code/harness-security-scan/skill.yaml </execution_context> <process> 1. Try: invoke mcp__harness__run_skill with skill: "harness-security-scan" 2. If MCP unavailable: read SKILL.md and follow its work...
/pentestRuns interactive security assessment on URL or codebase: confirms auth, scans web/dependencies/code, summarizes findings by severity, suggests prioritized fixes, generates JSON report.
/security-scanScans codebase for vulnerabilities, hardcoded secrets, OWASP Top 10 compliance, and security best practices violations. Produces report with issues and fix recommendations.
/scanRuns automated security scans for dependencies, secrets, and licenses; triages results by severity and generates prioritized reports with fix recommendations.
/kasi-securityRuns security audit on project codebase: detects stack (PHP/Node/Python/etc.), loads checklist, scans files for SQLi/XSS/CSRF/auth bypass/etc., outputs prioritized findings with confidence labels.
/security-scanScans PostgreSQL and MySQL databases for 50+ OWASP security vulnerabilities, generates compliance reports, automated remediation scripts, and audit trails.
/security-scanScans codebase for hardcoded secrets, vulnerable dependencies, code patterns like injections/XSS, and config issues. Produces structured report with issues, severities, and remediation steps.
Share bugs, ideas, or general feedback.
Phases:
<execution_context> @agents/skills/claude-code/harness-security-scan/SKILL.md @agents/skills/claude-code/harness-security-scan/skill.yaml </execution_context>
1. Try: invoke mcp__harness__run_skill with skill: "harness-security-scan" 2. If MCP unavailable: read SKILL.md and follow its workflow directly 3. Pass through any arguments provided by the user