From security-auditor
Use when the user wants to run a security audit on a registered machine.
npx claudepluginhub danielrosehill/claude-code-plugins --plugin security-auditorThis skill uses the workspace's default tool permissions.
Execute a security audit over SSH on a single registered machine. The audit checks for configuration drift, hardening gaps, policy compliance, and other findings. Output is timestamped and appended to the machine's audit log.
Prevents silent decimal mismatch bugs in EVM ERC-20 tokens via runtime decimals lookup, chain-aware caching, bridged-token handling, and normalization. For DeFi bots, dashboards using Python/Web3, TypeScript/ethers, Solidity.
Share bugs, ideas, or general feedback.
Execute a security audit over SSH on a single registered machine. The audit checks for configuration drift, hardening gaps, policy compliance, and other findings. Output is timestamped and appended to the machine's audit log.
quick, full, or report-only; default full)
quick — fast checks only (10–30 seconds)full — comprehensive scan (5–15 minutes)report-only — regenerate markdown from the most recent raw dataResolve the data directory:
DATA_DIR="${CLAUDE_USER_DATA:-${XDG_DATA_HOME:-$HOME/.local/share}/claude-plugins}/security-auditor/data"
REPO_BASE="$DATA_DIR"
export REPO_BASE
Verify the machine is registered:
cd /home/daniel/repos/github/my-repos/Claude-Security-Auditor-Plugin
bash scripts/list-machines.sh <machine_name> --json | jq .
Fail gracefully if the machine is not found.
Invoke the audit:
bash scripts/audit-machine.sh <machine_name> [--quick|--full|--report-only]
The script runs over SSH, writes reports/<timestamp>/audit-report.md, and updates audit-log.json.
Extract the report path from the output and read the markdown for a brief summary. Display path and key findings to the user.
${CLAUDE_USER_DATA}/security-auditor/data/machines/<machine-name>/reports/<ISO8601-timestamp>/audit-report.mdaudit-log.json updated with entry for this run