Performs a comprehensive security audit on a Claude Code plugin, detecting leaked secrets, unsafe paths, shell injection risks, sensitive files, and insecure scripts. [EXPLICIT] Trigger: audit security, security scan, check for secrets, find vulnerabilities. [EXPLICIT]
From jm-adknpx claudepluginhub javimontano/jm-adk-alfaThis skill is limited to using the following tools:
agents/guardian.mdagents/lead.mdagents/specialist.mdagents/support.mdevals/evals.jsonknowledge/body-of-knowledge.mdknowledge/knowledge-graph.mdprompts/meta.mdprompts/primary.mdprompts/variations/deep.mdprompts/variations/quick.mdreferences/security-patterns.mdtemplates/output.docx.mdtemplates/output.html"Security is not a feature -- it is a property of the entire system."
Performs a 6-category security scan on a Claude Code plugin: secret patterns, path security, hook command injection, sensitive files, and script safety. Produces a severity-classified report with specific remediation for each finding. [EXPLICIT]
Receive target plugin path -- accept the plugin root directory as input. Confirm the directory exists and contains a plugin.json (or .claude-plugin/plugin.json) or recognizable plugin structure before proceeding. [EXPLICIT]
Secret pattern detection -- scan all files for high-risk credential patterns:
sk-*, AKIA*, ghp_*, xox[bsp]-*password\s*=, secret\s*=, token\s*= (outside comments)BEGIN RSA PRIVATE KEY, BEGIN EC PRIVATE KEY, BEGIN OPENSSH PRIVATE KEY.env files containing KEY=, SECRET=, TOKEN=, PASSWORD=Path security analysis -- search for hardcoded or unsafe path usage:
/Users/, /home/, /opt/, C:\../ outside of comments and documentation${CLAUDE_PLUGIN_ROOT} -- flag any path that should be relative but is absoluteHook command security -- inspect all hook definitions for shell injection risks:
eval usage in hook commands$VAR instead of "$VAR")sh, bash, or execSensitive file detection -- glob for files that should not be in a plugin:
.env, .env.*.pem, .key, .p12, .pfxcredentials.json, service-account.jsonid_rsa, id_ed25519, *.pub (private key pairs)Script security -- evaluate shell scripts in scripts/ and hooks:
o+w)curl or wget without checksum or signature verificationchmod 777Generate security report -- compile all findings into a structured list with:
password=) in documentation or example files is mitigated by context checking, but edge cases remain.Bad finding:
WARNING: Possible secret found. [EXPLICIT]
Missing: no file path, no line number, no pattern, no remediation. [EXPLICIT]
Good finding:
CRITICAL | hooks/hooks.json:12 | Pattern: `sk-proj-*` (OpenAI API key) | Remediation: Remove the key, rotate it immediately, and use environment variables instead. [EXPLICIT]
Includes: severity, exact file and line, matched pattern with classification, specific remediation. [EXPLICIT]
.pem or .key files because only text content was searched. [EXPLICIT]../ usage is benign because "it's in a comment" without actually verifying. [EXPLICIT]${API_KEY} or <YOUR_TOKEN> in example files should be classified as INFO, not CRITICAL, since they are placeholders. [EXPLICIT]Example invocations:
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.