Claude Agent Skill · by Affaan M

Security Scan

The security-scan skill audits Claude Code project configurations for vulnerabilities, misconfigurations, and injection risks by scanning the `.claude/` directo

Install
Terminal · npx
$npx skills add https://github.com/affaan-m/everything-claude-code --skill security-scan
Works with Paperclip

How Security Scan fits into a Paperclip company.

Security Scan drops into any Paperclip agent that handles this kind of work. Assign it to a specialist inside a pre-configured PaperclipOrg company and the skill becomes available on every heartbeat — no prompt engineering, no tool wiring.

S
SaaS FactoryPaired

Pre-configured AI company — 18 agents, 18 skills, one-time purchase.

$27$59
Explore pack
Source file
SKILL.md165 lines
Expand
---name: security-scandescription: Scan your Claude Code configuration (.claude/ directory) for security vulnerabilities, misconfigurations, and injection risks using AgentShield. Checks CLAUDE.md, settings.json, MCP servers, hooks, and agent definitions.origin: ECC--- # Security Scan Skill Audit your Claude Code configuration for security issues using [AgentShield](https://github.com/affaan-m/agentshield). ## When to Activate - Setting up a new Claude Code project- After modifying `.claude/settings.json`, `CLAUDE.md`, or MCP configs- Before committing configuration changes- When onboarding to a new repository with existing Claude Code configs- Periodic security hygiene checks ## What It Scans | File | Checks ||------|--------|| `CLAUDE.md` | Hardcoded secrets, auto-run instructions, prompt injection patterns || `settings.json` | Overly permissive allow lists, missing deny lists, dangerous bypass flags || `mcp.json` | Risky MCP servers, hardcoded env secrets, npx supply chain risks || `hooks/` | Command injection via interpolation, data exfiltration, silent error suppression || `agents/*.md` | Unrestricted tool access, prompt injection surface, missing model specs | ## Prerequisites AgentShield must be installed. Check and install if needed: ```bash# Check if installednpx ecc-agentshield --version # Install globally (recommended)npm install -g ecc-agentshield # Or run directly via npx (no install needed)npx ecc-agentshield scan .``` ## Usage ### Basic Scan Run against the current project's `.claude/` directory: ```bash# Scan current projectnpx ecc-agentshield scan # Scan a specific pathnpx ecc-agentshield scan --path /path/to/.claude # Scan with minimum severity filternpx ecc-agentshield scan --min-severity medium``` ### Output Formats ```bash# Terminal output (default) — colored report with gradenpx ecc-agentshield scan # JSON — for CI/CD integrationnpx ecc-agentshield scan --format json # Markdown — for documentationnpx ecc-agentshield scan --format markdown # HTML — self-contained dark-theme reportnpx ecc-agentshield scan --format html > security-report.html``` ### Auto-Fix Apply safe fixes automatically (only fixes marked as auto-fixable): ```bashnpx ecc-agentshield scan --fix``` This will:- Replace hardcoded secrets with environment variable references- Tighten wildcard permissions to scoped alternatives- Never modify manual-only suggestions ### Opus 4.6 Deep Analysis Run the adversarial three-agent pipeline for deeper analysis: ```bash# Requires ANTHROPIC_API_KEYexport ANTHROPIC_API_KEY=your-keynpx ecc-agentshield scan --opus --stream``` This runs:1. **Attacker (Red Team)** — finds attack vectors2. **Defender (Blue Team)** — recommends hardening3. **Auditor (Final Verdict)** — synthesizes both perspectives ### Initialize Secure Config Scaffold a new secure `.claude/` configuration from scratch: ```bashnpx ecc-agentshield init``` Creates:- `settings.json` with scoped permissions and deny list- `CLAUDE.md` with security best practices- `mcp.json` placeholder ### GitHub Action Add to your CI pipeline: ```yaml- uses: affaan-m/agentshield@v1  with:    path: '.'    min-severity: 'medium'    fail-on-findings: true``` ## Severity Levels | Grade | Score | Meaning ||-------|-------|---------|| A | 90-100 | Secure configuration || B | 75-89 | Minor issues || C | 60-74 | Needs attention || D | 40-59 | Significant risks || F | 0-39 | Critical vulnerabilities | ## Interpreting Results ### Critical Findings (fix immediately)- Hardcoded API keys or tokens in config files- `Bash(*)` in the allow list (unrestricted shell access)- Command injection in hooks via `${file}` interpolation- Shell-running MCP servers ### High Findings (fix before production)- Auto-run instructions in CLAUDE.md (prompt injection vector)- Missing deny lists in permissions- Agents with unnecessary Bash access ### Medium Findings (recommended)- Silent error suppression in hooks (`2>/dev/null`, `|| true`)- Missing PreToolUse security hooks- `npx -y` auto-install in MCP server configs ### Info Findings (awareness)- Missing descriptions on MCP servers- Prohibitive instructions correctly flagged as good practice ## Links - **GitHub**: [github.com/affaan-m/agentshield](https://github.com/affaan-m/agentshield)- **npm**: [npmjs.com/package/ecc-agentshield](https://www.npmjs.com/package/ecc-agentshield)