npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
ModSecurity is an open-source WAF engine that works with Apache, Nginx, and IIS. The OWASP
Configures ModSecurity WAF with OWASP CRS for web app logging, tunes rules to cut false positives, analyzes audit logs for attacks, and adds custom SecRules.
Configures ModSecurity WAF with OWASP CRS for web app logging, tunes rules to reduce false positives, analyzes audit logs for attacks, and implements custom SecRules for app-specific threats.
Deploys and tunes WAF rules on AWS WAF, Azure WAF, and Cloudflare to protect cloud apps against OWASP Top 10, with managed/custom rules, rate limiting, bot management, and false positive reduction via logging. Use for API security, brute force defense, and compliance.
Share bugs, ideas, or general feedback.
ModSecurity is an open-source WAF engine that works with Apache, Nginx, and IIS. The OWASP Core Rule Set (CRS) provides generic attack detection rules covering SQL injection, XSS, RCE, LFI, and other OWASP Top 10 attacks. ModSecurity logs full request/response data in audit logs for forensic analysis and generates alerts that feed into SIEM platforms.
ModSecurity: Warning. Pattern match "(?:union\s+select)" [file "/etc/modsecurity/crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [msg "SQL Injection Attack Detected via libinjection"] [severity "CRITICAL"]