By diegouis
Provectus Security practice plugin for vulnerability scanning, compliance enforcement, secrets management, encryption, audit logging, threat modeling, OWASP Top 10 protection, and Zero Trust architecture.
npx claudepluginhub diegouis/provectus-marketplace --plugin proagent-securityApply production security hardening for autonomous agent deployments (reference: `casdk-harness/src/harness/security.py`, `casdk-harness/docs/HARDENING.md`).
Scan the repository for accidentally committed secrets and credentials.
Run a structured security audit using formula-based workflows (reference: `gastown/.beads/formulas/security-audit.formula.toml`).
Assess the project against a specified compliance framework.
Set up encryption for data protection.
Assess the access control implementation:
Review autonomous agent security posture (reference: `casdk-harness/src/harness/security.py`, `casdk-harness/docs/HARDENING.md`):
- Secrets hardcoded in pipeline configuration
Check for these vulnerability patterns:
- Running as root (missing `USER` directive in Dockerfile)
Check for these issues:
Check for XSS and CSRF vulnerabilities (reference: `agents/plugins/frontend-mobile-security/commands/xss-scan.md`, `agents/plugins/frontend-mobile-security/agents/frontend-security-coder.md`):
- Overly permissive security groups or firewall rules (0.0.0.0/0 ingress)
For Solidity smart contracts (reference: `agents/plugins/blockchain-web3/skills/solidity-security/SKILL.md`):
Analyze code changes and classify risk level (reference: `Auto-Claude/apps/backend/analysis/risk_classifier.py`, `Auto-Claude/apps/backend/analysis/security_scanner.py`).
Execute a multi-layer vulnerability scan on the codebase.
Create a structured threat model for the application.
Scan frontend code for cross-site scripting vulnerabilities (reference: `agents/plugins/frontend-mobile-security/commands/xss-scan.md`).
Overview of all security capabilities: vulnerability scanning, compliance enforcement, secrets management, encryption, threat modeling, OWASP Top 10, and Zero Trust architecture.
Review security posture: code security, dependency vulnerabilities, access controls, container security, CI/CD pipeline security, and infrastructure configuration.
Execute security operations: scan-vulnerabilities, audit-secrets, threat-model, compliance-check, encrypt-setup, xss-scan, risk-classify, agent-harden, or audit-workflow.
GitHub MCP server for repository security management, code scanning alerts, secret scanning alerts, Dependabot alerts, branch protection rules, and pull request security reviews.
GitLab MCP server for project security management, vulnerability reports, SAST/DAST pipeline results, dependency scanning, and merge request security approvals.
Agents specialized in security engineering and threat mitigation. Focuses on secure architecture, vulnerability assessment, and compliance.
Executes bash commands
Hook triggers when Bash tool is used
Modifies files
Hook triggers on file write and edit operations
External network access
Connects to servers outside your machine
Share bugs, ideas, or general feedback.
Professional security tools for Claude Code: vulnerability scanning, compliance, cryptography audit, container & API security
DevsForge comprehensive security vulnerability scanner with automated remediation suggestions.
Security best practices advisor with vulnerability detection and fixes
Comprehensive security plugin: OWASP Top 10, authentication patterns, cryptography, API security, secrets management, supply chain security, DevSecOps, container security, zero trust, and threat modeling.
Agents for code review, security audits, debugging, and quality assurance
Requires secrets
Needs API keys or credentials to function
Requires secrets
Needs API keys or credentials to function
Uses power tools
Uses Bash, Write, or Edit tools
Uses power tools
Uses Bash, Write, or Edit tools
Share bugs, ideas, or general feedback.