Help us improve
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Opsera DevSecOps Agent — AI-powered architecture analysis, security scanning, compliance auditing, and SQL security for your codebase. Free trial included.
npx claudepluginhub opsera-agents/opsera-devsecops --plugin opsera-devsecopsPerform a risk-focused architecture analysis on the current codebase using Opsera DevSecOps.
Run an evidence-based compliance audit on the current codebase using Opsera DevSecOps.
Run a comprehensive security scan on the current codebase using Opsera DevSecOps.
Scan SQL files or database tables for security vulnerabilities using Opsera DevSecOps.
Risk-focused architecture analysis that unearths deep insights specific to the codebase. Use when the user asks to analyze architecture, find architectural risks, review system design, verify auth routes, analyze failure modes, generate architecture diagrams, or understand tech stack trade-offs.
Evidence-based compliance auditing for SOC2, HIPAA, PCI-DSS, and ISO 27001 frameworks. Use when the user asks about compliance readiness, audit preparation, control gap analysis, certification requirements, or framework-specific compliance assessments.
Automatic security scan triggered before git commits. Runs the Opsera security scan tool against the entire repo, categorizes findings into new (staged) vs existing, and blocks commits only if staged changes have critical/high issues.
Technical security scanning for vulnerabilities, secrets, SAST, container security, and infrastructure-as-code issues. Use when the user asks for vulnerability scanning, secret detection, code security analysis, container scanning, or IaC security checks.
AI-powered SQL security scanning and auto-fix for Databricks and general SQL. Use when the user asks to scan SQL for injection vulnerabilities, detect PII in databases, validate SQL compliance, analyze database privileges, or auto-fix SQL security issues.
Executes bash commands
Hook triggers when Bash tool is used
External network access
Connects to servers outside your machine
Share bugs, ideas, or general feedback.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimBased on adoption, maintenance, documentation, and repository signals. Not a security audit or endorsement.
Perform security audit on codebase
Check OWASP Top 10 compliance
Perform security audit on codebase
Agents specialized in security engineering and threat mitigation. Focuses on secure architecture, vulnerability assessment, and compliance.
AI-powered security auditing with interactive skills, automated agents, web dependency scanning, and supply chain hardening for comprehensive vulnerability detection and reporting
Security scanning, dependency CVE audits, and exposure-aware risk prioritization.
Uses power tools
Uses Bash, Write, or Edit tools
Uses power tools
Uses Bash, Write, or Edit tools
Share bugs, ideas, or general feedback.
AI-powered DevSecOps analysis for Claude Code. Scan your codebase for architectural risks, security vulnerabilities, compliance gaps, and SQL security issues — all from your terminal.
| Tool | Description |
|---|---|
| Architecture Analysis | Risk-focused analysis with auth route verification, failure mode detection, and quantified architecture diagrams |
| Security Scan | Vulnerability scanning, secret detection, SAST, container security, and IaC checks |
| Compliance Audit | Evidence-based auditing for SOC2, HIPAA, PCI-DSS, and ISO 27001 with remediation roadmaps |
| SQL Security | SQL injection detection, PII discovery, compliance validation, privilege analysis, and AI-powered auto-fix |
/install opsera-devsecops
First, add the GitHub repo as a plugin marketplace, then install:
/plugin marketplace add opsera-agents/opsera-devsecops
/plugin install opsera-devsecops@opsera-devsecops
After installing, authenticate with Opsera via OAuth:
/mcp
This opens your browser for secure OAuth login. Tokens are stored in your system keychain and refresh automatically.
Use the slash commands directly:
/architecture-analyze # Analyze architecture risks
/security-scan # Run security vulnerability scan
/compliance-audit # Run compliance audit (SOC2, HIPAA, etc.)
/sql-security # Scan SQL for security issues
Or simply describe what you need and the agent will select the right tool:
"Scan this repo for security vulnerabilities"
"Are we SOC2 compliant?"
"Check my SQL files for injection risks"
"What are the architectural risks in this codebase?"
This agent includes 4 tools as part of the Opsera free trial. Additional DevSecOps tools will be added in future versions.
All tool executions report anonymized telemetry to the Opsera analytics dashboard, providing insights on security posture, compliance trends, and remediation progress. No source code is transmitted.
Apache-2.0