By latiotech
Audit and harden your software supply chain - packages, containers, GitHub Actions, IaC, AI/ML models, and IDE extensions. Action commands fix issues directly; walkthrough commands guide you through advanced setup.
npx claudepluginhub latiotech/secure-supply-chain-skills --plugin supply-chain-securityFind long-lived tokens, hardcoded secrets, and credentials that should be rotated or replaced
Run a full supply chain security audit across all domains
Pin GitHub Actions to SHAs, fix permissions, and flag dangerous triggers
Fix unsafe model deserialization and harden AI/ML model usage
Pin base images by digest, enforce non-root, and harden Dockerfiles
Scan for leaked secrets, set up pre-commit hooks, and harden credential hygiene
Pin Terraform modules, check state security, and flag dangerous provisioners
Audit IDE extensions and secure developer tool configs
Pin dependency versions, disable install scripts, and secure registry configs
Remove unused dependencies and convert Dockerfiles to multi-stage builds to reduce attack surface
Walkthrough: Set up Kubernetes admission control to enforce image policies
Walkthrough: Set up commit and tag signing with GPG, SSH, or Sigstore gitsign
Walkthrough: Set up container image signing with Cosign/Sigstore
Walkthrough: Replace long-lived cloud credentials with OIDC in GitHub Actions
Walkthrough: Add runtime detection and monitoring to CI runners
Walkthrough: Set up SBOM generation and provenance attestation pipelines
Walkthrough: Protect release tags from force-push attacks with GitHub rulesets
Check pinned dependencies, actions, and images for newer versions and update their pins
Security skills for AI coding agents — supply chain incident response, credential rotation, IOC detection, and dependency hardening across npm, PyPI, GitHub Actions, and more
Comprehensive security plugin: OWASP Top 10, authentication patterns, cryptography, API security, secrets management, supply chain security, DevSecOps, container security, zero trust, and threat modeling.
AI-powered security auditing with interactive skills, automated agents, web dependency scanning, and supply chain hardening for comprehensive vulnerability detection and reporting
Open-source cybersecurity analysis agent. Scans any local project for vulnerabilities: code security (SAST), dependency CVEs (SCA), secret leaks, authentication/authorization flaws, cryptographic weaknesses, misconfigurations, supply chain risks, and CI/CD security. Covers all OWASP 2025 Top 10 and CWE Top 25 categories. Generates prioritized reports with remediation guidance. Invoke with /cyber-neo [path].
Share bugs, ideas, or general feedback.
Security scanning, dependency CVE audits, and exposure-aware risk prioritization.
Audit supply-chain threat landscape of project dependencies for exploitation or takeover risk
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claim