By mintmcp
Protect AI development workflows from credential leaks by scanning Bash tool calls before execution to guard against risks, scrubbing secrets from outputs afterward, and triggering admission reminders on user prompt submissions.
npx claudepluginhub mintmcp/agent-security --plugin secrets-scannerThis repository currently provides a secrets scanner plugin.
Coding agents are powerful, but we've repeatedly seen them read and propagate sensitive data during everyday work. That can be acceptable for casual "vibe coding" experiments, but it's not acceptable for production software engineering. We built this to make accidental leakage much harder: a standalone, local-first scanner with minimal footprint (no external dependencies, regex-only), running as editor/agent hooks entirely on your machine, and easy to set up so teams can adopt it without friction.

Install via the Claude Code plugin marketplace:
/plugin marketplace add mintmcp/agent-security
/plugin install secrets-scanner@agent-security
pipx install claude-secret-scan
# or
python3 -m pip install --user claude-secret-scan
Add hooks to ~/.claude/settings.json if using PyPI:
{
"hooks": {
"UserPromptSubmit": [
{"hooks": [{"type": "command", "command": "claude-secret-scan --mode=pre"}]}
],
"PreToolUse": [
{"matcher": "Read|read", "hooks": [{"type": "command", "command": "claude-secret-scan --mode=pre"}]}
],
"PostToolUse": [
{"matcher": "Read|read", "hooks": [{"type": "command", "command": "claude-secret-scan --mode=post"}]},
{"matcher": "Bash|bash", "hooks": [{"type": "command", "command": "claude-secret-scan --mode=post"}]}
]
}
}
Copy examples/configs/cursor-hooks.json to ~/.cursor/hooks.json or configure similarly:
{
"version": 1,
"hooks": {
"beforeReadFile": [{"command": "cursor-secret-scan --mode=pre"}],
"beforeSubmitPrompt": [{"command": "cursor-secret-scan --mode=pre"}]
}
}
.
├── .claude-plugin/
│ └── marketplace.json
├── plugins/
│ └── secrets_scanner/
│ ├── .claude-plugin/
│ │ └── plugin.json
│ ├── hooks/
│ │ ├── hooks.json
│ │ └── secrets_scanner_hook.py
│ ├── tests/
│ │ └── read_hook_test.py
│ ├── TESTING.md
│ └── README.md
├── examples/
│ └── configs/
├── pyproject.toml
└── README.md
plugins/secrets_scanner/hooks/secrets_scanner_hook.py for the core implementation and patterns.Apache License 2.0. See LICENSE.
Regex patterns were informed by or adapted from detect-secrets (Apache 2.0).
The most comprehensive Claude Code plugin — 38 agents, 156 skills, 72 legacy command shims, selective install profiles, and production-ready hooks for TDD, security scanning, code review, and continuous learning
Executes bash commands
Hook triggers when Bash tool is used
Complete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, rules, and legacy command shims evolved over 10+ months of intensive daily use
Complete collection of battle-tested Claude Code configs agents, skills, hooks, rules, and legacy command shims evolved over 10+ months of intensive daily use
Complete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, and rules evolved over 10+ months of intensive daily use
Complete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, and rules evolved over 10+ months of intensive daily use
Complete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, and rules evolved over 10+ months of intensive daily use