security-scan

Audit Claude Code configurations for security vulnerabilities, misconfigurations, and injection risks. Scans five configuration areas: CLAUDE.md , settings.json , MCP servers, hooks, and agent definitions for hardcoded secrets, prompt injection patterns, overly permissive permissions, and command injection risks Provides four output formats (terminal, JSON, Markdown, HTML) and integrates with CI/CD via GitHub Action with configurable severity filtering Includes auto-fix mode for safe remediations like replacing hardcoded secrets with environment variables, plus optional Opus 4.6 deep analysis using a three-agent red-team/blue-team pipeline Requires AgentShield installation via npm; can run directly with npx without setup

INSTALLATION
npx skills add https://github.com/affaan-m/everything-claude-code --skill security-scan
Run in your project or agent environment. Adjust flags if your CLI version differs.

SKILL.md

Security Scan Skill

Audit your Claude Code configuration for security issues using AgentShield.

When to Activate

  • Setting up a new Claude Code project
  • After modifying .claude/settings.json, CLAUDE.md, or MCP configs
  • Before committing configuration changes
  • When onboarding to a new repository with existing Claude Code configs
  • Periodic security hygiene checks

What It Scans

File

Checks

CLAUDE.md

Hardcoded secrets, auto-run instructions, prompt injection patterns

settings.json

Overly permissive allow lists, missing deny lists, dangerous bypass flags

mcp.json

Risky MCP servers, hardcoded env secrets, npx supply chain risks

hooks/

Command injection via interpolation, data exfiltration, silent error suppression

agents/*.md

Unrestricted tool access, prompt injection surface, missing model specs

Prerequisites

AgentShield must be installed. Check and install if needed:

# Check if installed

npx ecc-agentshield --version

# Install globally (recommended)

npm install -g ecc-agentshield

# Or run directly via npx (no install needed)

npx ecc-agentshield scan .

Usage

Basic Scan

Run against the current project's .claude/ directory:

# Scan current project

npx ecc-agentshield scan

# Scan a specific path

npx ecc-agentshield scan --path /path/to/.claude

# Scan with minimum severity filter

npx ecc-agentshield scan --min-severity medium

Output Formats

# Terminal output (default) — colored report with grade

npx ecc-agentshield scan

# JSON — for CI/CD integration

npx ecc-agentshield scan --format json

# Markdown — for documentation

npx ecc-agentshield scan --format markdown

# HTML — self-contained dark-theme report

npx ecc-agentshield scan --format html > security-report.html

Auto-Fix

Apply safe fixes automatically (only fixes marked as auto-fixable):

npx ecc-agentshield scan --fix

This will:

  • Replace hardcoded secrets with environment variable references
  • Tighten wildcard permissions to scoped alternatives
  • Never modify manual-only suggestions

Opus 4.6 Deep Analysis

Run the adversarial three-agent pipeline for deeper analysis:

# Requires ANTHROPIC_API_KEY

export ANTHROPIC_API_KEY=your-key

npx ecc-agentshield scan --opus --stream

This runs:

  • Attacker (Red Team) — finds attack vectors
  • Defender (Blue Team) — recommends hardening
  • Auditor (Final Verdict) — synthesizes both perspectives

Initialize Secure Config

Scaffold a new secure .claude/ configuration from scratch:

npx ecc-agentshield init

Creates:

  • settings.json with scoped permissions and deny list
  • CLAUDE.md with security best practices
  • mcp.json placeholder

GitHub Action

Add to your CI pipeline:

- uses: affaan-m/agentshield@v1

  with:

    path: '.'

    min-severity: 'medium'

    fail-on-findings: true

Severity Levels

Grade

Score

Meaning

A

90-100

Secure configuration

B

75-89

Minor issues

C

60-74

Needs attention

D

40-59

Significant risks

F

0-39

Critical vulnerabilities

Interpreting Results

Critical Findings (fix immediately)

  • Hardcoded API keys or tokens in config files
  • Bash(*) in the allow list (unrestricted shell access)
  • Command injection in hooks via ${file} interpolation
  • Shell-running MCP servers

High Findings (fix before production)

  • Auto-run instructions in CLAUDE.md (prompt injection vector)
  • Missing deny lists in permissions
  • Agents with unnecessary Bash access

Medium Findings (recommended)

  • Silent error suppression in hooks (2>/dev/null, || true)
  • Missing PreToolUse security hooks
  • npx -y auto-install in MCP server configs

Info Findings (awareness)

  • Missing descriptions on MCP servers
  • Prohibitive instructions correctly flagged as good practice

Links

BrowserAct

Let your agent run on any real-world website

Bypass CAPTCHA & anti-bot for free. Start local, scale to cloud.

Explore BrowserAct Skills →

Stop writing automation&scrapers

Install the CLI. Run your first Skill in 30 seconds. Scale when you're ready.

Start free
free · no credit card