npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
- When deploying or configuring implementing honeytokens for breach detection capabilities in your environment
Deploys honeytokens including fake AWS credentials, DNS canaries, document beacons, and DB records via Canarytokens API and webhooks to alert on attacker access for intrusion detection.
Deploys honeytokens like fake AWS credentials, DNS canaries, document beacons, and database records that trigger alerts on access using Canarytokens API and webhooks. For breach detection in security operations.
Deploys and monitors Canary Tokens via Thinkst Canary API for deception-based breach detection using web bug, DNS, document, and AWS key tokens. Useful for cybersecurity tripwires.
Share bugs, ideas, or general feedback.
Deploy honeytokens across critical systems to detect unauthorized access. Each token type alerts via webhook when triggered by an attacker.
import requests
# Create a DNS canary token via Canarytokens
resp = requests.post("https://canarytokens.org/generate", data={
"type": "dns",
"email": "soc@company.com",
"memo": "Production DB server honeytoken",
})
token = resp.json()
print(f"DNS token: {token['hostname']}")
Token types to deploy:
# Generate a fake AWS credentials file with canary token
aws_creds = f"[default]\naws_access_key_id = {canary_key_id}\naws_secret_access_key = {canary_secret}\n"
with open("/opt/backup/.aws/credentials", "w") as f:
f.write(aws_creds)