Scan DAPR project for security vulnerabilities, plain-text secrets, missing ACLs, and configuration issues
Scans DAPR projects for security vulnerabilities, secrets, and configuration issues.
/plugin marketplace add Sahib-Sawhney-WH/sahibs-claude-plugin-marketplace/plugin install dapr@sahib-claude-marketplaceScan your DAPR project for security issues and best practice violations.
When the user runs /dapr:security:
Locate Configuration Files
components/dapr.yaml if presentRun Security Checks
secretKeyRef for sensitive fieldsGenerate Report
DAPR Security Scan Results
==========================
Files Scanned: 5
CRITICAL Issues (1):
✗ components/statestore.yaml:15
Plain-text password in 'redisPassword'
→ Use secretKeyRef instead of value
HIGH Issues (0): None
MEDIUM Issues (2):
⚠ components/pubsub.yaml
No scope restrictions defined
→ Add scopes to limit access
⚠ dapr.yaml
No resiliency policy referenced
→ Create resiliency.yaml for production
LOW Issues (1):
○ components/secretstore.yaml
Using connectionString instead of managed identity
→ Consider azureClientId for managed identity auth
Summary: 1 critical, 0 high, 2 medium, 1 low
Status: FAILED (critical issues found)
Suggest Fixes For each issue, provide:
| Argument | Description |
|---|---|
--path | Path to scan (default: current directory) |
--fix | Attempt to auto-fix issues |
--report | Generate JSON report file |
--fail-on | Fail on severity level (critical, high, medium, low) |
/dapr:security
/dapr:security --path ./services/order-service
/dapr:security --report security-report.json
/dapr:security --fail-on critical
/dapr:security --fix
secretKeyRef for all sensitive valuesscopes on all componentsaccessControl with defaultAction: deny| Code | Meaning |
|---|---|
| 0 | No issues or only LOW severity |
| 1 | MEDIUM or HIGH issues found |
| 2 | CRITICAL issues found |