Help us improve
Share bugs, ideas, or general feedback.
From clawdstrike
Performs security reviews for risky code changes like sensitive file edits, shell commands, dependencies, CI/CD, and secrets using Clawdstrike MCP tools for policy checks.
npx claudepluginhub backbay-labs/clawdstrike --plugin clawdstrikeHow this skill is triggered — by the user, by Claude, or both
Slash command
/clawdstrike:security-reviewThe summary Claude sees in its skill listing — used to decide when to auto-load this skill
<trigger>
Blocks unsafe code before commit with secret scanning, OWASP Top 10 detection, dependency audits (npm/pip/cargo), and permission checks. Hard security gate on critical findings.
Enforces runtime security policies on Claude Code actions via Pre/PostToolUse hooks, blocks dangerous shell commands/file ops/MCP calls, scans configs for OWASP ASI10 vulnerabilities, logs audit trails.
Scans Claude Code plugins for execution surface risks, supply chain vulnerabilities, data exfiltration, and prompt injection patterns. Use for auditing plugins before installation.
Share bugs, ideas, or general feedback.
Before proceeding with risky actions, use the clawdstrike_check MCP tool to verify policy compliance:
clawdstrike_check with the action_type and target before executingUse these action_type values when calling clawdstrike_check:
| Scenario | action_type | target |
|---|---|---|
| Writing/reading files | file | Absolute file path |
| Running shell commands | shell | The command string |
| HTTP/network requests | egress | Domain or URL |
| Installing packages | shell | Install command |
| MCP tool invocation | mcp_tool | Tool name |
When this skill is active:
clawdstrike_check before file writes to sensitive pathsUse these MCP tools in order of priority when this skill activates:
| Tool | When to Use |
|---|---|
clawdstrike_check | Before any file write, shell command, or egress -- the primary enforcement tool |
clawdstrike_policy_eval | To test hypothetical actions without executing them -- use for planning |
clawdstrike_policy_show | To understand which guards are active and what the current restrictions are |
clawdstrike_scan | To audit all MCP server configs for misconfigurations before a review |
clawdstrike_policy_lint | To validate policy YAML files for syntax/schema errors |
These guards are evaluated during checks: