npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
Runtime Application Self-Protection (RASP) instruments application code at runtime to detect and block attacks by examining actual execution context rather than relying solely on network traffic patterns. Unlike WAFs that inspect HTTP requests externally, RASP agents intercept dangerous operations (SQL queries, file operations, command execution, deserialization) at the function level inside th...
Deploys OpenRASP RASP agents to Java (Tomcat, Spring Boot) and Python (Flask, Django) apps for runtime detection/blocking of SQLi, XSS, RCE, and other OWASP Top 10 attacks.
Deploys OpenRASP RASP agents in Java (Tomcat/Spring Boot/JBoss) and Python (Flask/Django) web apps to detect/block runtime attacks like SQLi, XSS, RCE, SSRF internally with low false positives.
Configures ModSecurity WAF with OWASP CRS for web application logging, tunes rules to reduce false positives, analyzes audit logs for attacks, and implements custom SecRules.
Share bugs, ideas, or general feedback.
Runtime Application Self-Protection (RASP) instruments application code at runtime to detect and block attacks by examining actual execution context rather than relying solely on network traffic patterns. Unlike WAFs that inspect HTTP requests externally, RASP agents intercept dangerous operations (SQL queries, file operations, command execution, deserialization) at the function level inside the application, achieving near-zero false positives. This skill covers deploying OpenRASP for Java applications, configuring detection policies for OWASP Top 10 attacks, tuning alerting thresholds, and integrating RASP telemetry with SIEM platforms.
Install the RASP agent into the application server runtime using JVM agent attachment for Java or middleware hooks for Python.
Define detection rules for SQL injection, command injection, SSRF, path traversal, XXE, and deserialization attacks with block or monitor actions.
Run the agent in monitor mode during normal operations to establish baseline behavior and tune policies to reduce false positives before switching to block mode.
Forward RASP alerts to the SIEM for correlation with WAF, IDS, and authentication events to build comprehensive attack timelines.
JSON report containing RASP policy audit results, detected attack attempts with stack traces, blocked requests summary, and coverage assessment against OWASP Top 10.