By alexgreensh
Automatically scan git repositories, AI agent stacks, plugins, skills, MCP servers, and dependencies for security risks like CVEs, prompt injection, credential theft, runtime exploits, and manifest drift during clone, install, session start, or bash tool execution.
npx claudepluginhub alexgreensh/repo-forensics --plugin repo-forensicsThe agent stack you have already installed is your biggest blind spot.
Security forensics for git repos, AI skills, and MCP servers. Audits dependencies, detects prompt injection, credential theft, runtime dynamism, manifest drift, known CVEs, CISA KEV (actively exploited) vulns, and 2026 attack patterns. Not for fixing vulnerabilities or pentesting.
Executes bash commands
Hook triggers when Bash tool is used
Share bugs, ideas, or general feedback.
Security scanning, dependency CVE audits, and exposure-aware risk prioritization.
Open-source cybersecurity analysis agent. Scans any local project for vulnerabilities: code security (SAST), dependency CVEs (SCA), secret leaks, authentication/authorization flaws, cryptographic weaknesses, misconfigurations, supply chain risks, and CI/CD security. Covers all OWASP 2025 Top 10 and CWE Top 25 categories. Generates prioritized reports with remediation guidance. Invoke with /cyber-neo [path].
Audit supply-chain threat landscape of project dependencies for exploitation or takeover risk
AI-powered security auditing with interactive skills, automated agents, web dependency scanning, and supply chain hardening for comprehensive vulnerability detection and reporting
Security reminder hook that warns about potential security issues when editing files, including command injection, XSS, and unsafe code patterns