From security-auditor
Use when the user wants to audit every registered machine in one pass.
npx claudepluginhub danielrosehill/claude-code-plugins --plugin security-auditorThis skill uses the workspace's default tool permissions.
Run security audits across the entire fleet in sequence. Produces a summary table showing which machines passed/failed and high-level findings per machine.
Prevents silent decimal mismatch bugs in EVM ERC-20 tokens via runtime decimals lookup, chain-aware caching, bridged-token handling, and normalization. For DeFi bots, dashboards using Python/Web3, TypeScript/ethers, Solidity.
Share bugs, ideas, or general feedback.
Run security audits across the entire fleet in sequence. Produces a summary table showing which machines passed/failed and high-level findings per machine.
quick, full, or report-only; default full)Resolve the data directory:
DATA_DIR="${CLAUDE_USER_DATA:-${XDG_DATA_HOME:-$HOME/.local/share}/claude-plugins}/security-auditor/data"
REPO_BASE="$DATA_DIR"
export REPO_BASE
List all registered machines:
cd /home/daniel/repos/github/my-repos/Claude-Security-Auditor-Plugin
MACHINES=$(bash scripts/list-machines.sh --json | jq -r '.[].name')
Loop over each machine and run the audit:
for MACHINE in $MACHINES; do
echo "Auditing $MACHINE..."
bash scripts/audit-machine.sh "$MACHINE" [--quick|--full|--report-only]
done
Parse each report and collect results into a summary table (machine name, timestamp, critical/warning/pass count, overall status).
Display the table and note any machines that failed to audit (SSH down, permissions denied, etc.).
reports/ directories