By jar-analyzer
Build SQLite analysis databases from Java JAR/WAR/Class files to capture classes, methods, calls, inheritance, strings, and Spring components. Execute SQL queries for security audits including vulnerability detection, method/call chain searches, and string analysis.
npx claudepluginhub jar-analyzer/jar-analyzer-claude --plugin jar-analyzer-plugin基于 jar-analyzer 的 Claude Code 插件,用于 Java JAR/WAR 包静态分析与安全审计。
一行命令添加插件市场:
/plugin marketplace add https://github.com/jar-analyzer/jar-analyzer-claude
添加完成后,在插件市场中选择 jar-analyzer-plugin 进行安装。
⚠️ 插件内置了打包好的
jar-analyzer-engine,文件较大,下载可能需要一些时间,请耐心等待。

使用 /build-db 命令,指定需要审计分析的 JAR/WAR 文件,构建分析数据库。
💡 建议在空目录中执行,分析完成后当前目录下会生成
jar-analyzer-temp临时目录和jar-analyzer.db数据库文件。

使用 /do-analyze 命令,对数据库执行安全审计查询(优先使用 sqlite3 命令,其次回退到 python 脚本)。

分析完成后,自动生成详细的安全审计报告,坐等结果即可。

| 依赖 | 版本 | 用途 |
|---|---|---|
| Java | 8+ | 运行分析引擎和反编译 |
| Python | 3+(可选) | 执行 SQL 查询脚本(作为 sqlite3 的备选方案) |
DECX Android analysis workflows for skills, agents, and hooks
Scan Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. For authorized security research only.
Detect SQL injection vulnerabilities
Java quality toolkit — security (OWASP), performance (N+1, memory, threading), and testing (JUnit 5, Mockito, Testcontainers) for Java 8+ projects
Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.
Share bugs, ideas, or general feedback.
Ultra-compressed communication mode. Cuts ~75% of tokens while keeping full technical accuracy by speaking like a caveman.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim