mirror of
https://github.com/SuperClaude-Org/SuperClaude_Framework.git
synced 2025-12-29 16:16:08 +00:00
- Core configuration files (CLAUDE.md, RULES.md, PERSONAS.md, MCP.md) - 17 slash commands for specialized workflows - 25 shared YAML resources for advanced configurations - Installation script for global deployment - 9 cognitive personas for specialized thinking modes - MCP integration patterns for intelligent tool usage - Token economy and ultracompressed mode support 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
174 lines
4.6 KiB
Markdown
174 lines
4.6 KiB
Markdown
## Legend
|
|
| Symbol | Meaning | | Abbrev | Meaning |
|
|
|--------|---------|---|--------|---------|
|
|
| → | leads to | | cfg | configuration |
|
|
| & | and/with | | deps | dependencies |
|
|
| w/ | with | | vuln | vulnerability |
|
|
|
|
Execute immediately. Add --plan flag if user wants to see plan first.
|
|
|
|
Scan code, ops, or systems→security vulns & safety issues in $ARGUMENTS.
|
|
|
|
Scan type w/ flags:
|
|
|
|
--validate flag:
|
|
- Pre-execution safety validation | Op risk assessment
|
|
- Permission & access checks | Quick safety verification before running commands
|
|
|
|
--security flag:
|
|
- Comprehensive security analysis
|
|
- w/ --owasp: Focus→OWASP Top 10 | w/ --deps: Deps vuln scan
|
|
- Deep security audit→code & cfg
|
|
|
|
## Validation Mode (--validate)
|
|
|
|
Pre-execution safety checks:
|
|
|
|
**Security validation**:
|
|
- Path traversal prevention | No execution outside project boundaries
|
|
- Secrets and credentials detection
|
|
- Permission verification
|
|
- Input sanitization checks
|
|
|
|
**Code validation**:
|
|
- Syntax correctness
|
|
- Import and dependency verification
|
|
- Breaking change detection
|
|
- Configuration validity
|
|
- Type safety checks
|
|
|
|
**Operation validation**:
|
|
- Git state verification
|
|
- Branch protection compliance
|
|
- Resource availability
|
|
- Rollback capability
|
|
- Blast radius assessment
|
|
|
|
**Risk assessment**:
|
|
- Calculate risk score (1-10)
|
|
- Impact analysis (data loss, downtime)
|
|
- Reversibility evaluation
|
|
- Required permissions check
|
|
- Compliance verification
|
|
|
|
Validation workflow:
|
|
1. Parse intended operation
|
|
2. Run all applicable checks
|
|
3. Generate risk score
|
|
4. Report with clear indicators:
|
|
- ✅ Pass - Safe to proceed
|
|
- ⚠️ Warning - Caution advised
|
|
- ❌ Block - Do not proceed
|
|
|
|
Integration behavior:
|
|
- Auto-trigger for risky operations
|
|
- Chain with execution: scan --validate && execute
|
|
- Block CRITICAL [10] severity issues
|
|
- Require confirmation for HIGH [7-9] risks
|
|
|
|
## Security Mode (--security)
|
|
|
|
Comprehensive security analysis:
|
|
|
|
**OWASP Top 10 checks**:
|
|
- Injection flaws (SQL, NoSQL, OS command, LDAP)
|
|
- Broken authentication and session management
|
|
- Sensitive data exposure
|
|
- XML external entities (XXE)
|
|
- Broken access control
|
|
- Security misconfiguration
|
|
- Cross-site scripting (XSS)
|
|
- Insecure deserialization
|
|
- Using components with known vulnerabilities
|
|
- Insufficient logging and monitoring
|
|
|
|
**Code security analysis**:
|
|
- Input validation gaps
|
|
- Output encoding issues
|
|
- Authentication weaknesses
|
|
- Authorization flaws
|
|
- Cryptographic problems
|
|
- Error handling leaks
|
|
- Session management
|
|
- File operation safety
|
|
|
|
**Dependency scanning**:
|
|
- Known CVE detection
|
|
- Outdated package identification
|
|
- License compliance check
|
|
- Transitive dependency analysis
|
|
- Security patch availability
|
|
- Typosquatting detection
|
|
|
|
**Configuration security**:
|
|
- Hardcoded secrets scan
|
|
- Environment variable safety
|
|
- Permission configurations
|
|
- Network exposure
|
|
- TLS/SSL settings
|
|
- CORS policies
|
|
- Security headers
|
|
|
|
**Infrastructure security**:
|
|
- Open ports and services
|
|
- Firewall rules
|
|
- Access control lists
|
|
- Encryption in transit/rest
|
|
- Backup security
|
|
- Logging configuration
|
|
|
|
## Quick Scan Options
|
|
|
|
With --quick flag:
|
|
- Fast validation for common issues
|
|
- Skip deep analysis
|
|
- Focus on critical problems
|
|
- Rapid feedback loop
|
|
|
|
With --strict flag:
|
|
- Zero-tolerance mode
|
|
- Flag all potential issues
|
|
- Enforce best practices
|
|
- Require explicit overrides
|
|
|
|
## Scan Output
|
|
|
|
Results include:
|
|
- Executive summary with risk level
|
|
- Detailed findings by category
|
|
- Severity ratings (CRITICAL/HIGH/MEDIUM/LOW)
|
|
- Specific remediation steps
|
|
- Code examples for fixes
|
|
- References to security resources
|
|
- Compliance mapping (if applicable)
|
|
|
|
Severity classification:
|
|
- **CRITICAL [10]**: Immediate action required
|
|
- **HIGH [7-9]**: Fix before deployment
|
|
- **MEDIUM [4-6]**: Address in next sprint
|
|
- **LOW [1-3]**: Best practice improvements
|
|
|
|
## Integration
|
|
|
|
Works with other commands:
|
|
- Run before deploy: `/project:scan --validate && /project:deploy`
|
|
- Security gate: `/project:scan --security --strict`
|
|
- CI/CD integration: Fail build on HIGH+ findings
|
|
- Pre-commit hooks: Quick validation
|
|
|
|
Best practices:
|
|
- Run validation before any risky operation
|
|
- Schedule regular security scans
|
|
- Track and trend findings over time
|
|
- Automate where possible
|
|
- Document exceptions with justification
|
|
|
|
Report Output:
|
|
- Safety reports: `.claudedocs/reports/safety-scan-<timestamp>.md`
|
|
- Security reports: `.claudedocs/reports/security-scan-<timestamp>.md`
|
|
- Ensure directory exists: `mkdir -p .claudedocs/reports/`
|
|
- Include report location in output: "📄 Scan report saved to: [path]"
|
|
|
|
Deliverables:
|
|
- For validate: Safety report, risk score, proceed/block recommendation
|
|
- For security: Vulnerability report, remediation guide, risk assessment, compliance status |