Perform AI-powered security audits on codebases targeting OWASP Top 10 vulnerabilities and anti-patterns, scan deployed websites for outdated frontend libraries CVEs and security headers without source code, harden Node.js supply chains against attacks, and initialize project denial settings for multiple tech stacks.
npx claudepluginhub charlesjones-dev/claude-code-plugins-dev --plugin ai-securityConducts comprehensive security audits in fresh context using the Security Audit skill. Use when context is saturated or for automated security reviews.
Scans websites for outdated dependencies, CVEs, and security misconfigurations. Use when analyzing deployed web applications or when context is saturated.
Comprehensive security audit to identify vulnerabilities, OWASP Top 10 issues, and security anti-patterns.
Initialize Claude Code security settings with intelligent file denial patterns based on your project's technology stack.
Scan a deployed website for outdated dependencies, known CVEs, and security misconfigurations.
Harden your project against npm supply chain attacks by configuring pnpm's minimumReleaseAge quarantine and frozen lockfile enforcement.
Security scanning, dependency CVE audits, and exposure-aware risk prioritization.
Uses power tools
Uses Bash, Write, or Edit tools
Share bugs, ideas, or general feedback.
Open-source cybersecurity analysis agent. Scans any local project for vulnerabilities: code security (SAST), dependency CVEs (SCA), secret leaks, authentication/authorization flaws, cryptographic weaknesses, misconfigurations, supply chain risks, and CI/CD security. Covers all OWASP 2025 Top 10 and CWE Top 25 categories. Generates prioritized reports with remediation guidance. Invoke with /cyber-neo [path].
Check OWASP Top 10 compliance
Implements automated security scanning for dependencies, code, and containers using tools like Trivy, Snyk, and npm audit. Use when setting up CI/CD security gates, conducting pre-deployment audits, or meeting compliance requirements.
Perform security audit on codebase
Security best practices advisor with vulnerability detection and fixes