npx claudepluginhub standardbeagle/agnt --plugin agntAudit the current page for security vulnerabilities using agnt's diagnostic tools.
Run the security audit:
proxy {action: "exec", id: "dev", code: "__devtool.auditSecurity()"}
Check for JavaScript errors (may indicate security issues):
proxylog {proxy_id: "dev", types: ["error"], limit: 20}
Capture the page state to review cookies and storage:
proxy {action: "exec", id: "dev", code: "__devtool.captureState()"}
Take a screenshot for documentation:
proxy {action: "exec", id: "dev", code: "__devtool.screenshot('security-audit')"}
| Issue | Description |
|---|---|
mixed-content | HTTP resources loaded on HTTPS page (blocks secure content) |
insecure-form | Form submitting to HTTP URL (credentials exposed) |
| Issue | Description |
|---|---|
missing-noopener | target="_blank" links without rel="noopener" (tabnabbing risk) |
password-autocomplete | Password fields with autocomplete enabled |
The audit returns:
issues: Array of security vulnerabilities foundcount: Total number of issueserrors: Critical security issueswarnings: Non-critical security concernsFor mixed content issues, the resources array shows:
type: Resource type (script, stylesheet, image)url: The insecure HTTP URLThe captureState() function reveals:
HttpOnly flag on sensitive cookiesSecure flag on HTTPS sites// Check Content Security Policy
proxy {action: "exec", id: "dev", code: "document.querySelector('meta[http-equiv=\"Content-Security-Policy\"]')?.content"}
// Find all forms and their actions
proxy {action: "exec", id: "dev", code: "Array.from(document.forms).map(f => ({action: f.action, method: f.method}))"}
// Find all scripts (check for untrusted sources)
proxy {action: "exec", id: "dev", code: "Array.from(document.scripts).map(s => s.src).filter(s => s)"}
// Check for inline event handlers (XSS risk)
proxy {action: "exec", id: "dev", code: "document.querySelectorAll('[onclick], [onerror], [onload]').length"}
rel="noopener noreferrer"HttpOnly and Secure flags/audit-securityAudits PHP projects for OWASP Top 10 and PHP-specific vulnerabilities including injection, XSS, CSRF, auth issues; reports severity, CWE IDs, attack vectors.