/ Каталог / Песочница / claude-cybersecurity
● Сообщество AgriciDaniel ⚡ Сразу

claude-cybersecurity

автор AgriciDaniel · AgriciDaniel/claude-cybersecurity

Defensive code-review skill: 8 parallel agents for vulns, authz, secrets, supply chain, IaC, threat intel, AI-code patterns, and business-logic flaws — OWASP 2025 + CWE Top 25 + MITRE.

Zero-config defensive security review built for Claude Code. Deploys 8 specialist agents in parallel covering vulnerability detection, authorization, secret scanning, supply chain, IaC, threat intel (malware / C2 / backdoor patterns), AI-generated code patterns, and business logic flaws. Maps findings to OWASP 2025, CWE Top 25, MITRE ATT&CK, PCI-DSS. 11+ languages. Complements (not replaces) GitHub Advanced Security.

Зачем использовать

Ключевые функции

Живое демо

Как выглядит на практике

claude-cybersecurity-skill.replay ▶ готово
0/0

Установка

Выберите клиент

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "claude-cybersecurity-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/AgriciDaniel/claude-cybersecurity",
        "~/.claude/skills/claude-cybersecurity"
      ],
      "_inferred": true
    }
  }
}

Откройте Claude Desktop → Settings → Developer → Edit Config. Перезапустите после сохранения.

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "claude-cybersecurity-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/AgriciDaniel/claude-cybersecurity",
        "~/.claude/skills/claude-cybersecurity"
      ],
      "_inferred": true
    }
  }
}

Cursor использует ту же схему mcpServers, что и Claude Desktop. Конфиг проекта приоритетнее глобального.

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "claude-cybersecurity-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/AgriciDaniel/claude-cybersecurity",
        "~/.claude/skills/claude-cybersecurity"
      ],
      "_inferred": true
    }
  }
}

Щёлкните значок MCP Servers на боковой панели Cline, затем "Edit Configuration".

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "claude-cybersecurity-skill": {
      "command": "git",
      "args": [
        "clone",
        "https://github.com/AgriciDaniel/claude-cybersecurity",
        "~/.claude/skills/claude-cybersecurity"
      ],
      "_inferred": true
    }
  }
}

Тот же формат, что и Claude Desktop. Перезапустите Windsurf для применения.

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "claude-cybersecurity-skill",
      "command": "git",
      "args": [
        "clone",
        "https://github.com/AgriciDaniel/claude-cybersecurity",
        "~/.claude/skills/claude-cybersecurity"
      ]
    }
  ]
}

Continue использует массив объектов серверов, а не map.

~/.config/zed/settings.json
{
  "context_servers": {
    "claude-cybersecurity-skill": {
      "command": {
        "path": "git",
        "args": [
          "clone",
          "https://github.com/AgriciDaniel/claude-cybersecurity",
          "~/.claude/skills/claude-cybersecurity"
        ]
      }
    }
  }
}

Добавьте в context_servers. Zed перезагружается автоматически.

claude mcp add claude-cybersecurity-skill -- git clone https://github.com/AgriciDaniel/claude-cybersecurity ~/.claude/skills/claude-cybersecurity

Однострочная команда. Проверить: claude mcp list. Удалить: claude mcp remove.

Сценарии использования

Реальные сценарии: claude-cybersecurity

Pre-release security review of a new service

👤 Engineering teams before shipping to production ⏱ ~60 min intermediate

Когда использовать: Before a release with a new or heavily changed service.

Предварительные требования
  • Skill installed — git clone https://github.com/AgriciDaniel/claude-cybersecurity ~/.claude/skills/claude-cybersecurity
Поток
  1. Run the full 8-agent pass
    Use claude-cybersecurity on services/payment. Full pass — vulns, authz, secrets, supply chain, IaC, business logic.✓ Скопировано
    → Report with findings per agent, severity, OWASP/CWE mapping
  2. Triage and route
    Group by severity. For each critical/high, draft a GitHub issue with reproduction steps.✓ Скопировано
    → Issue drafts ready to paste

Итог: A defensible pre-release sign-off with a paper trail.

Подводные камни
  • Treating business-logic flags as false positives automatically — Those are the ones static tools miss — read them twice
Сочетать с: github · repo-forensics-skill

Review AI-generated code for the mistakes LLMs make

👤 Teams accepting lots of PR code from Copilot/Claude/Cursor ⏱ ~45 min intermediate

Когда использовать: Auditing merged or pending PRs that were AI-assisted.

Поток
  1. Focus on the AI-code agent
    Use claude-cybersecurity — ai-code patterns only. Flag: hallucinated middleware, plausible-but-wrong crypto, trust-all defaults.✓ Скопировано
    → Pattern-specific flags
  2. Cross-check authz flags
    Now run the authorization agent — AI tends to miss role checks on non-happy paths.✓ Скопировано
    → Authz matrix showing gaps

Итог: Catch the class of mistakes LLMs make before they ship.

Сочетать с: github

Sweep infrastructure-as-code for dangerous defaults

👤 Platform teams ⏱ ~30 min intermediate

Когда использовать: Before merging Terraform / K8s / CloudFormation changes.

Поток
  1. Run IaC agent
    Use claude-cybersecurity IaC agent on terraform/ — flag public S3, open security groups, privileged pods.✓ Скопировано
    → Misconfigs with severity + fix diffs

Итог: Clean IaC before it hits the cluster.

Scan for malware / C2 / backdoor patterns in dependencies

👤 Security engineers auditing third-party code ⏱ ~30 min intermediate

Когда использовать: New dependency coming in, or suspicious dep update.

Поток
  1. Run threat-intel agent
    Run claude-cybersecurity threat-intel on node_modules — known malicious patterns.✓ Скопировано
    → Pattern matches (or clean)

Итог: Early warning before a malicious package slips in.

Подводные камни
  • False positives on obfuscated legitimate libs (e.g. minified SDKs) — Cross-check with published source; don't auto-remove
Сочетать с: repo-forensics-skill

Комбинации

Сочетайте с другими MCP — эффект x10

claude-cybersecurity-skill + repo-forensics-skill

Layer supply-chain + install-time audits with app-level code review

Run repo-forensics on the dep tree, then claude-cybersecurity on our app code.✓ Скопировано
claude-cybersecurity-skill + github

Auto-file issues for each high-severity finding

After the review, open a GitHub issue per high finding with CWE + remediation.✓ Скопировано

Инструменты

Что предоставляет этот MCP

ИнструментВходные данныеКогда вызыватьСтоимость
agent_vulns code path Standard review 0
agent_authz code path Multi-role apps 0
agent_secrets code path Always 0
agent_supply_chain manifest files Dep updates 0
agent_iac iac dir Infra PRs 0
agent_threat_intel code/deps path Third-party audits 0
agent_ai_code code path AI-assisted PRs 0
agent_business_logic code path, domain hints High-trust workflows (payments, auth) 0

Стоимость и лимиты

Во что обходится

Квота API
None
Токенов на вызов
High — 8 agents in parallel
Деньги
Free
Совет
Scope to the diff of a PR rather than whole repo when you can

Безопасность

Права, секреты, радиус поражения

Минимальные скоупы: Read on the code under review
Хранение учётных данных: None
Исходящий трафик: None beyond LLM call — findings stay local
Никогда не давайте: Write access to the audited repo during review

Устранение неполадок

Частые ошибки и исправления

Too many findings to process

Filter by severity=high,critical first; revisit rest iteratively

Agent mislabels framework conventions as vulns

Provide framework context: 'this is Rails, strong_params is in use'

Альтернативы

claude-cybersecurity в сравнении

АльтернативаКогда использоватьКомпромисс
repo-forensicsYou need install-time / supply-chain vetting, not app code reviewDifferent threat model
GitHub Advanced Security (CodeQL)You want SAST integrated into the PR workflowMisses business logic and AI patterns

Ещё

Ресурсы

📖 Читать официальный README на GitHub

🐙 Открытые задачи

🔍 Все 400+ MCP-серверов и Skills