claude-cybersecurity
Health Warn
- License — License: MIT
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 9 GitHub stars
Code Fail
- rm -rf — Recursive force deletion command in install.sh
- rm -rf — Recursive force deletion command in uninstall.sh
Permissions Pass
- Permissions — No dangerous permissions requested
This skill integrates with Claude Code to run automated, AI-powered security audits on your codebase. It spawns multiple specialist agents to detect vulnerabilities, secrets, and business logic flaws across various programming languages.
Security Assessment
The tool requests no inherently dangerous permissions. However, the installation and uninstallation scripts contain `rm -rf` recursive force deletion commands, which pose a risk to your local file system if those scripts are buggy or behave unexpectedly. No hardcoded secrets were found. The tool itself is designed to read your source code, meaning it inherently accesses potentially sensitive data and intellectual property during an audit. Given the destructive commands in the setup scripts, the overall risk is rated as Medium.
Quality Assessment
The project is very new and has extremely low visibility, demonstrated by only 9 GitHub stars. That said, it is an actively maintained repository with a recent last push and a clear MIT license. The README is comprehensive and well-documented. Because of the low community adoption, it has not yet been widely peer-reviewed or battle-tested by a large user base.
Verdict
Use with caution — the core utility appears useful and is open source, but you should manually review the `install.sh` script before executing it to ensure the `rm -rf` commands only target the intended directories.
AI-powered cybersecurity code review skill for Claude Code. 8 specialist agents, OWASP 2025, CWE Top 25, MITRE ATT&CK, 11 languages, zero configuration.
The most comprehensive AI-powered cybersecurity code review skill for Claude Code. Spawns 8 parallel specialist agents to audit your codebase across vulnerability detection, authorization verification, secret scanning, supply chain analysis, IaC security, threat intelligence (malware/C2/backdoor detection), AI-generated code patterns, and business logic flaws.
Surpasses GitHub Advanced Security by detecting what static tools architecturally cannot: missing security controls, business logic flaws, attack-path chaining, and obfuscated secrets — with zero configuration.
Installation
One-liner (recommended)
curl -fsSL https://raw.githubusercontent.com/AgriciDaniel/claude-cybersecurity/main/install.sh | bash
Manual
git clone https://github.com/AgriciDaniel/claude-cybersecurity.git
cd claude-cybersecurity
bash install.sh
Windows (PowerShell)
irm https://raw.githubusercontent.com/AgriciDaniel/claude-cybersecurity/main/install.ps1 | iex
Quick Start
# Full security audit of current project
/cybersecurity
# Quick scan (entry points + auth + secrets + deps only)
/cybersecurity --scope quick
# Review only changed files (PR review mode)
/cybersecurity --scope diff
# Deep dive into one dimension
/cybersecurity --focus threat
# With compliance mapping
/cybersecurity --compliance pci
What It Does
Key Differentiators vs GitHub Advanced Security
| Capability | GHAS | This Skill |
|---|---|---|
| Business logic flaw detection | No | Yes |
| Authorization enforcement verification | Basic | Context-aware |
| Race condition detection | Very limited | Concurrency pattern analysis |
| Languages supported | 12 | 16+ (any language) |
| IaC/Container/CI-CD scanning | No | Terraform, Docker, K8s, Actions |
| AI-generated code security | No | Specialized detection |
| Obfuscated secret detection (84.4% recall) | Regex only | Semantic understanding |
| Threat intelligence (malware/C2) | No | MITRE ATT&CK mapped |
| Framework-aware false-positive suppression | No | 10 frameworks |
| Cost | $49/committer/month | Free (with Claude Code) |
Coverage
Scoring System
Architecture
File Structure
skills/cybersecurity/
├── SKILL.md (900 lines — orchestrator)
├── references/
│ ├── vulnerability-taxonomy.md (25 CWE categories)
│ ├── scoring-rubric.md (formula + confidence system)
│ ├── threat-intelligence.md (MITRE ATT&CK patterns)
│ ├── compliance-matrix.md (5 frameworks)
│ ├── false-positive-suppression.md (10 frameworks)
│ ├── semgrep-patterns.md (8 detection patterns)
│ ├── report-template.md (output format + worked example)
│ ├── language-patterns/ (11 files)
│ └── iac-patterns/ (4 files)
Total: 23 files, 5,350 lines of security knowledge.
Requirements
- Claude Code (CLI, Desktop, or IDE extension)
- No other dependencies — zero configuration, works immediately
Uninstall
curl -fsSL https://raw.githubusercontent.com/AgriciDaniel/claude-cybersecurity/main/uninstall.sh | bash
Or manually:
rm -rf ~/.claude/skills/cybersecurity
Related Projects
- claude-seo — Comprehensive SEO analysis
- claude-blog — Full-lifecycle blog engine
- claude-ads — Paid advertising audit
License
MIT - AgriciDaniel 2026
Reviews (0)
Sign in to leave a review.
Leave a reviewNo results found