From agentops
Runs repository security scans with semgrep, gosec, gitleaks for quick pre-PR gates, full pre-release checks, and nightly monitoring.
npx claudepluginhub boshu2/agentops --plugin agentopsThis skill uses the workspace's default tool permissions.
> **Purpose:** Run repeatable security checks across code, scripts, hooks, and release gates.
Creates isolated Git worktrees for feature branches with prioritized directory selection, gitignore safety checks, auto project setup for Node/Python/Rust/Go, and baseline verification.
Executes implementation plans in current session by dispatching fresh subagents per independent task, with two-stage reviews: spec compliance then code quality.
Dispatches parallel agents to independently tackle 2+ tasks like separate test failures or subsystems without shared state or dependencies.
Purpose: Run repeatable security checks across code, scripts, hooks, and release gates.
Use this skill when you need deterministic security validation before merge/release, or recurring scheduled checks.
/security # quick security gate
/security --full # full gate with test-inclusive toolchain checks
/security --release # full gate for release readiness
/security --json # machine-readable report output
Run quick gate:
scripts/security-gate.sh --mode quick
Expected behavior:
$TMPDIR/agentops-security/<run-id>/.Run full gate:
scripts/security-gate.sh --mode full
Expected behavior:
Nightly workflow should run:
scripts/security-gate.sh --mode full
Expected behavior:
When gate fails:
$TMPDIR/agentops-security/ and identify scanner + file.scripts/security-gate.sh until gate passes.Security gate run: <run-id>
Mode: <quick|full>
Result: <pass|blocked>
Top findings:
- <scanner> <severity> <file> <summary>
Actions:
- <fix or issue id>
.github/workflows/validate.yml.github/workflows/nightly.yml.github/workflows/release.ymlskills/security-suite/SKILL.md (includes security_suite.py and prompt_redteam.py)User says: /security
What happens:
scripts/security-gate.sh --mode quick, which executes available scanners (semgrep, gosec, gitleaks) against the current working tree and flags high/critical findings./deps vuln to scan for vulnerable dependencies (OWASP A06: Vulnerable and Outdated Components).$TMPDIR/agentops-security/<run-id>/ for review, and the gate reports a pass/blocked verdict.Result: The gate passes with no high/critical findings, confirming the branch is safe to open a PR.
User says: /security --release
What happens:
scripts/security-gate.sh --mode full, which performs a comprehensive scan including all scanner passes, test-inclusive toolchain checks, and stricter severity thresholds.$TMPDIR/agentops-security/<run-id>/ for audit trail and incident response, and a structured report is generated.Result: The full gate blocks the release on two medium-severity findings in cli/internal/config.go; the operator triages and fixes them before re-running the gate to get a clean pass.
| Problem | Cause | Solution |
|---|---|---|
| Gate reports "scanner not found" and skips checks | Required scanner (semgrep, gosec, or gitleaks) is not installed | Install the missing scanner: brew install semgrep, go install github.com/securego/gosec/v2/cmd/gosec@latest, or brew install gitleaks. |
| Gate passes locally but fails in CI | CI environment has additional scanners or stricter config | Compare $TMPDIR/agentops-security/ artifacts from both environments; align scanner versions and config files across local and CI. |
| False positive blocking the gate | Scanner flags a non-issue as high/critical severity | Add a scanner-specific inline suppression comment (e.g., # nosemgrep: rule-id) or update the scanner config to exclude the pattern, then document the suppression reason. |
Artifacts directory $TMPDIR/agentops-security/ not created | Script lacks write permissions or $TMPDIR is not writable | Verify $TMPDIR is set and writable; the script auto-creates subdirectories on each run. |
| Nightly scan not detecting regressions | Nightly workflow is not configured or is pointing at stale branch | Verify .github/workflows/nightly.yml runs scripts/security-gate.sh --mode full against the correct branch (typically main). |