A

security-scan

by affaan-m

The security-scan skill audits your Claude Code .claude/ configuration for secrets, risky MCP setup, injection-prone instructions, dangerous bypass flags, and weak agent or hook definitions using AgentShield. Use it for repeatable security checks before committing or onboarding.

Stars156.3k
Favorites0
Comments0
AddedApr 15, 2026
CategorySecurity Audit
Install Command
npx skills add affaan-m/everything-claude-code --skill security-scan
Curation Score

This skill scores 78/100, which means it is a solid listing candidate for directory users who want a focused security audit of Claude Code configuration. It gives enough concrete workflow guidance to install with reasonable confidence, though users should note it depends on an external tool and could use tighter quick-start packaging.

78/100
Strengths
  • Clear activation scenarios for new projects, config changes, commits, onboarding, and periodic checks.
  • Specific scan coverage across CLAUDE.md, settings.json, mcp.json, hooks, and agents/*.md, which helps agents understand exactly what to inspect.
  • Practical usage guidance with AgentShield install/run commands and explicit security checks like secrets, injection patterns, risky MCP servers, and command injection.
Cautions
  • Requires AgentShield to be installed, so the skill is not fully self-contained.
  • No support files or install command are present, which may leave some setup and execution details to the user.
Overview

Overview of security-scan skill

What security-scan does

The security-scan skill audits a Claude Code project’s .claude/ configuration for security risks using AgentShield. It looks for secrets, risky MCP server setup, injection-prone instructions, dangerous bypass flags, and weak agent or hook definitions.

Who should install it

Use the security-scan skill if you maintain Claude Code configs, review AI agent setups, or need a repeatable security check before committing changes. It is most useful for repo owners, platform engineers, and anyone onboarding to an existing project with unknown .claude hygiene.

Why it matters in practice

A generic prompt can miss config-specific threats. This skill is aimed at the real job: quickly deciding whether a Claude Code setup is safe enough to trust, and identifying where the risk lives so you can fix it before it spreads.

How to Use security-scan skill

Install and confirm the toolchain

For security-scan install, add the skill from the directory’s repo path:
npx skills add affaan-m/everything-claude-code --skill security-scan

Then confirm AgentShield is available:
npx ecc-agentshield --version

If needed, install it globally with npm install -g ecc-agentshield, or run scans directly with npx ecc-agentshield scan ..

Give the skill the right input

The security-scan usage works best when you point it at a specific Claude Code workspace and describe the change you are reviewing. Strong input looks like: “Scan this repo’s .claude/ folder after the new MCP server and hook updates, and flag any secret exposure, injection paths, or overbroad tool access.”

Read the files in this order

Start with SKILL.md, then inspect CLAUDE.md, .claude/settings.json, mcp.json, hooks/, and agents/*.md. That order matches the scan surface and helps you map findings back to the exact config file instead of treating the output as a generic security report.

Use a review loop, not a one-off run

Run the scan before commit, after config edits, and during onboarding to a repo. For security-scan for Security Audit, focus on whether each finding changes trust: secrets should be removed, risky commands should be narrowed, and any prompt-injection exposure should be rewritten as explicit constraints.

security-scan skill FAQ

Is security-scan only for Claude Code users?

Yes. This skill is built around Claude Code configuration in .claude/, not general application security scanning or source-code vulnerability hunting.

What makes it different from a normal prompt?

A normal prompt may ask for a security review, but security-scan encodes the exact surfaces to check: CLAUDE.md, settings, MCP servers, hooks, and agent files. That makes it better for repeatable reviews and less dependent on the model guessing what “security” means.

Is it beginner-friendly?

Yes, if you can identify the repo’s Claude Code config files. The main limitation is that it assumes you can act on findings like risky shell interpolation, permissive allow lists, or exposed secrets.

When should I not use it?

Do not use security-scan as a substitute for application vulnerability testing, dependency auditing, or secrets scanning across the whole codebase. It is best when the security question is specifically about Claude Code configuration.

How to Improve security-scan skill

Make the scan scope explicit

The best security-scan results come from naming the exact directory, branch, or config change. “Scan .claude/” is useful; “review my repo” is too broad and increases the chance of shallow findings.

Provide the change you fear most

Tell the skill what changed: a new MCP server, a modified hook, a new agent, or a settings tweak. That helps it weigh the most likely failure mode instead of reporting everything with the same priority.

Ask for decision-grade output

If you want better security-scan usage, request findings in a fix-first format: file, risk, why it matters, and the smallest safe change. That reduces ambiguity and makes it easier to patch configs without overcorrecting.

Iterate after the first pass

After the first run, rescan only the files you changed. For a security-scan guide that produces better results over time, treat each finding as a prompt to tighten allow lists, remove risky instructions, or simplify hooks before the next review.

Ratings & Reviews

No ratings yet
Share your review
Sign in to leave a rating and comment for this skill.
G
0/10000
Latest reviews
Saving...