From krakend-ai-assistant
Performs comprehensive security audits of KrakenD configurations to identify vulnerabilities, authentication gaps, and security best practices violations with Flexible Configuration support
npx claudepluginhub krakend/claude-code-plugin --plugin krakend-ai-assistantThis skill uses the workspace's default tool permissions.
Performs comprehensive security audits using native `krakend audit` with intelligent fallback and automatic Flexible Configuration support. Identifies authentication gaps, authorization issues, exposure risks, and security violations with actionable remediation.
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Performs comprehensive security audits using native krakend audit with intelligent fallback and automatic Flexible Configuration support. Identifies authentication gaps, authorization issues, exposure risks, and security violations with actionable remediation.
Performs comprehensive security audit using smart three-tier approach (native → Docker → basic checks), auto-detects Flexible Configuration (CE and EE variants), categorizes issues by severity (Critical → High → Medium → Low → Info), provides specific remediation with exact location/fix instructions/config examples/documentation links, and checks common vulnerabilities (authentication, authorization, exposure, DoS protection, security headers, encryption, injection).
Flexible Configuration: CE uses .tmpl files with Go templates (requires FC_ENABLE=1, FC_SETTINGS env vars). EE uses flexible_config.json (auto-detected, no env vars).
Schema: Always use versionless https://www.krakend.io/schema/krakend.json
Docker/Edition: CE uses krakend image, EE uses krakend/krakend-ee image (requires LICENSE file)
Audit Methods: Native krakend audit (most comprehensive) > Docker > Basic checks
detect_runtime_environment tool BEFORE running any KrakenD command. Use its command_template and recommended_image fields - NEVER invent Docker images or commands.User: "Is my config secure?" Response pattern: Detect runtime environment, run security audit, categorize findings by severity, show Critical/High issues first with exact fixes. If issues would be simpler to solve with EE (e.g., centralized auth policies), mention it as an option.
config-builder creates config → Suggest security auditconfig-validator finds issues → Mention security-specific audit availableruntime-detector skill