JSPM

claudesec

0.6.1
  • ESM via JSPM
  • ES Module Entrypoint
  • Export Map
  • Keywords
  • License
  • Repository URL
  • TypeScript Types
  • README
  • Created
  • Published
  • Downloads 4
  • Score
    100M100P100Q38551F
  • License MIT

DevSecOps toolkit for AI-assisted secure development — security scanner, ISMS dashboard, asset management

Package Exports

    This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (claudesec) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.

    Readme

    ClaudeSec

    ClaudeSec logo    ClaudeSec mascot

    AI Security Best Practices toolkit for secure development with Claude Code

    npm version GitHub stars License: MIT PRs Welcome OpenSSF Scorecard OWASP

    ClaudeSec integrates security best practices directly into your AI-powered development workflow. It provides security-focused prompts, hooks, templates, and guides designed for use with Claude Code and CI/CD pipelines.

    Quick Start

    npx (no install)

    npx claudesec scan                # Security scan — no install needed
    npx claudesec dashboard           # Full scan + dashboard

    Git clone + Docker

    git clone https://github.com/Twodragon0/claudesec.git
    cd claudesec
    ./scripts/quick-start.sh          # Docker build + scan + serve

    Claude Code slash commands

    /scan                             # Run security scan
    /dashboard                        # Build + serve dashboard
    /audit                            # Full security audit
    /team-scan                        # Parallel multi-agent scan
    /security-review                  # Pre-commit security check

    Dashboard serves at http://localhost:11777/

    Options

    npx claudesec scan                      # Scan only
    npx claudesec dashboard                 # Full scan + dashboard
    ./scripts/quick-start.sh --scan-only    # Docker scan only
    ./scripts/quick-start.sh --serve        # Serve existing dashboard

    Asset Management Dashboard (optional — requires API keys)

    cp .env.example ~/Desktop/.env          # Edit with your API keys
    ./scripts/setup.sh                      # Install hooks + templates
    source .venv-asset/bin/activate
    python3 scripts/build-dashboard.py      # Build asset dashboard
    docker compose up dashboard -d          # Serve on localhost:11777

    Requires: Docker Desktop. See .env.example for API key setup.

    Command What it does
    ./run Full scan + dashboard + serve at localhost:11777 (safe mode: --kill-port)
    ./run --no-serve Full scan + dashboard only (no server)
    ./run --quick Quick scan (3 categories) + dashboard + serve
    ./run --docker Full scan + dashboard in Docker (publishes localhost:11777)
    ./scripts/run-dashboard-safe.sh Full scan + serve with automatic port fallback/cleanup options

    Or run the script directly:

    ./scripts/run-full-dashboard.sh              # full + serve
    ./scripts/run-full-dashboard.sh --no-serve   # full, no server
    ./scripts/run-full-dashboard.sh --quick      # quick + serve
    ./scripts/run-dashboard-safe.sh              # full + serve (auto fallback port when 11777 is busy)
    ./scripts/run-dashboard-safe.sh --kill-port  # full + serve (terminate process occupying 11777)
    ./scripts/run-dashboard-safe.sh --docker     # run dashboard workflow in Docker

    Docker Run

    The default image runs local scanner categories (code, access-control, infra, cicd, saas, etc.) and now includes kubectl + prowler CLI so -c prowler / Kubernetes scans can also run inside Docker (assuming you mount credentials/kubeconfig). For production-grade cloud/K8s scanning, prefer running on the host with --kubeconfig and AWS/GCP/Azure SSO profiles, or use a hardened custom image that adds your org-specific tooling.

    # Build image once (or let wrappers auto-build)
    docker build -t claudesec:local .
    
    # Dashboard flow in Docker
    ./run --docker
    ./run --docker --no-serve
    ./run --docker --quick
    
    # Scanner flow in Docker
    ./scripts/run-scan-docker.sh
    ./scripts/run-scan-docker.sh -c code
    ./scripts/run-scan-docker.sh -c infra
    ./scripts/run-scan-docker.sh -c access-control

    Recommended day-to-day flow:

    ./scripts/run-dashboard-safe.sh --kill-port  # avoid port-conflict / stale-server issues
    ./run --quick                                # fast smoke check
    ./run --no-serve                             # final full scan artifact generation
    grep -q "ClaudeSec local security scanner results" claudesec-dashboard.html

    Not sure where to start?

    From the repo root, run ./run. The first run may take a few minutes (full scan); use ./run --quick for a faster try with 3 categories. For container-first validation, run ./run --docker --no-serve and check claudesec-dashboard.html.


    Why ClaudeSec?

    AI coding assistants accelerate development — but speed without security creates risk. ClaudeSec bridges this gap:

    • Shift-left security: Catch vulnerabilities before they reach production
    • AI-native guardrails: Security hooks and prompts designed for Claude Code workflows
    • AI Security automation: GitHub Actions, pre-commit hooks, and CI/CD templates
    • SaaS security scanning: Datadog, Cloudflare, Vercel, ArgoCD, Sentry, Okta, SendGrid, and more
    • Supply chain integrity: SLSA, SBOM, and artifact signing workflows
    • Compliance mapping: SOC 2, ISO 27001, NIST, PCI-DSS, KISA ISMS-P, KISA 주요정보통신기반시설
    • Living documentation: Actionable guides for OWASP Top 10, MITRE ATLAS, and more

    ISMS Asset & Security Dashboard

    ClaudeSec provides an ISMS PDCA-based integrated dashboard that combines security scanning, asset management, and vulnerability assessment into a single view.

    ClaudeSec Asset Dashboard Architecture

    One Command — Full Asset Scan + Dashboard

    # Full: security scan + asset collection + dashboard build + Docker serve
    ./run-all.sh
    
    # Quick scan only (code, infra, cicd)
    ./run-all.sh --quick
    
    # Include AWS infrastructure collection
    ./run-all.sh --aws
    
    # Build dashboard only (skip scan)
    ./run-all.sh --build-only

    Dashboard served at http://localhost:11777 (Docker) with 9 tabs:

    Tab Data Sources Description
    ISMS PDCA All sources Plan/Do/Check/Act cycle with scores
    ClaudeSec Scan Scanner Code, infra, CI/CD, AI security checks
    Security Prowler, Datadog SIEM Vulnerability findings, severity distribution
    Asset Management Sheets, SentinelOne, Jamf PC/endpoint inventory, EDR cross-verification
    Infrastructure AWS, Datadog EC2, RDS, ElastiCache, Karpenter node detection
    SaaS & License Sheets SaaS inventory, auth method analysis, license tracking
    Cost Analysis xlsx Monthly SaaS spending by software/department
    AI Subscription Sheets AI service usage (Claude, GPT, Cursor, etc.)
    Security Signals Datadog SIEM, Notion 14-day alerts + security audit history

    Data Collection

    The dashboard aggregates data from multiple sources:

    Data Sources                  Collection Method
    ─────────────────────────────────────────────────
    Datadog API                   Hosts, SIEM signals, SentinelOne logs
    Google Sheets API             Asset registry, SaaS, licenses
    Google Drive API (xlsx)       SaaS cost/spending data
    AWS CLI (describe)            EC2, RDS, ElastiCache, S3, EKS
    Prowler (K8s Job)             CIS benchmark, security checks
    Notion API                    Security audit history
    ClaudeSec Scanner             Code, infra, CI/CD, AI checks

    Cross-Verification

    Automatically detects discrepancies between data sources:

    • EC2 cross-verify: AWS live instances vs asset registry (Karpenter dynamic nodes auto-excluded)
    • Endpoint cross-verify: Jamf MDM vs SentinelOne EDR (identifies devices missing protection)
    • SaaS auth audit: Identifies ID/PW-only services that need SSO migration

    Configuration

    # Required: Google OAuth (first-time browser auth)
    pip install gspread google-auth google-auth-oauthlib openpyxl
    
    # Required: Datadog API keys in ~/Desktop/.env
    # datadog_key_credential=<API_KEY>
    # datadog_app_key_credential=<APP_KEY>
    
    # Optional: AWS profiles for infrastructure collection
    # Requires valid AWS CLI sessions (SSO or credentials)
    
    # Optional: Prowler K8s CronJob (weekly scan)
    kubectl apply -f .claudesec-prowler/prowler-rbac.yaml --context <dev-cluster>
    kubectl apply -f .claudesec-prowler/prowler-cronjob.yaml --context <dev-cluster>

    Docker

    # Start dashboard (nginx, port 11777)
    docker compose up -d dashboard
    
    # Endpoints:
    #   http://localhost:11777           → ISMS Dashboard
    #   http://localhost:11777/scan.html → ClaudeSec Scan Dashboard

    Directory Structure

    claudesec/
    ├── run-all.sh                          # One-command: scan + build + serve
    ├── scripts/
    │   ├── build-dashboard.py              # Dashboard data collection & HTML build
    │   ├── asset-gsheet-sync.py            # Google Sheets sync
    │   ├── collect-assets.sh               # Multi-source asset collector
    │   ├── run-prowler-k8s.sh              # Prowler K8s scan (CronJob-based)
    │   └── full-asset-sync.py              # Full sync to Google Sheets
    ├── claudesec-asset-dashboard.html      # Dashboard template (no data)
    ├── .claudesec-prowler/
    │   ├── prowler-rbac.yaml               # K8s ServiceAccount + ClusterRole
    │   └── prowler-cronjob.yaml            # Weekly Prowler CronJob
    ├── scanner/                            # ClaudeSec security scanner
    ├── docker-compose.yml                  # Docker stack
    └── Dockerfile.nginx                    # Dashboard serving

    Privacy: All scan results, asset data, and dashboard files with real data are in .gitignore. Only templates and scripts are committed. No PII, company info, or credentials are included in the repository.


    Scanner CLI

    ClaudeSec includes a zero-dependency bash scanner that checks your project for security best practices across 10 categories (~120+ checks). Optionally integrates with Prowler for deep multi-cloud scanning.

    Scanner anchors

    Scanner Quick Start

    # From repo root
    ./scripts/run-scan.sh
    ./scripts/run-scan.sh --docker
    
    # Direct CLI
    ./scanner/claudesec scan -d .
    ./scanner/claudesec scan --category cloud
    ./scanner/claudesec scan --severity high,critical
    ./scanner/claudesec scan --format json

    Scanner CI Templates

    # Prowler deep scan (requires prowler)
    ./scanner/claudesec scan -c prowler --aws-profile audit
    
    # AWS SSO all profiles
    ./scanner/claudesec scan -c prowler --aws-sso-all
    AWS_SSO_LOGIN_TIMEOUT=20 CLAUDESEC_CI=1 CI=true ./scanner/claudesec scan -c prowler --aws-sso-all -f json
    
    # Strict SSO mode for templates/prowler.yml
    # vars.CLAUDESEC_STRICT_SSO=1
    
    # Token-expiry gate vars for templates/prowler.yml / templates/security-scan-suite.yml
    # vars.GH_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
    # vars.OKTA_OAUTH_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
    # vars.CLAUDESEC_TOKEN_EXPIRY_GATE_MODE=24h
    # vars.CLAUDESEC_TOKEN_EXPIRY_PROVIDERS=github,okta,datadog,slack
    # vars.CLAUDESEC_TOKEN_EXPIRY_STRICT_PROVIDERS=true
    # vars.CLAUDESEC_DD_ARTIFACT_RETENTION_DAYS=30   # valid range: 1-90

    Reusable workflow components:

    • .github/actions/token-expiry-gate
    • .github/actions/datadog-ci-collect

    Scanner OAuth and Token Policy

    Okta recommends scoped OAuth 2.0 access tokens over SSWS API tokens for automation.

    • Preferred: OKTA_OAUTH_TOKEN
    • Fallback: OKTA_API_TOKEN
    • Strict scope check: CLAUDESEC_STRICT_OKTA_SCOPES=1
    • Required scopes override: CLAUDESEC_OKTA_REQUIRED_SCOPES
    export OKTA_ORG_URL="https://dev-123456.okta.com"
    export OKTA_OAUTH_TOKEN="<okta-oauth-access-token>"
    export GH_TOKEN="<github-token>"
    export CLAUDESEC_OKTA_REQUIRED_SCOPES="okta.users.read,okta.policies.read,okta.logs.read"
    export CLAUDESEC_STRICT_OKTA_SCOPES=1
    ./scanner/claudesec scan -c saas

    Scanner SaaS Live Scan

    # SaaS API scan
    ./scanner/claudesec scan -c saas
    
    # Dashboard with token expiry windows
    export OKTA_OAUTH_TOKEN_EXPIRES_AT="2026-03-13T09:00:00Z"
    export GH_TOKEN_EXPIRES_AT="2026-03-13T08:30:00Z"
    export CLAUDESEC_TOKEN_EXPIRY_WARNING_24H="24h"
    export CLAUDESEC_TOKEN_EXPIRY_WARNING_7D="7d"
    ./scanner/claudesec dashboard --serve --host 127.0.0.1 --port 11665
    
    # Optional: populate OAuth readiness cards via ~/.claudesec.env (auto-loaded)
    cat > ~/.claudesec.env <<'EOF'
    GH_TOKEN=<github-token>
    GITHUB_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
    OKTA_OAUTH_TOKEN=<okta-oauth-token>
    OKTA_OAUTH_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
    EOF
    ./run --no-serve
    
    # Datadog local auto-fetch
    DD_API_KEY=<your-dd-api-key> DD_APP_KEY=<your-dd-app-key> DD_SITE=datadoghq.com ./scanner/claudesec dashboard

    CI reproducibility check (dashboard regression gate)

    Use a deterministic check in CI to catch dashboard generation regressions:

    ./scripts/run-dashboard-docker.sh --quick --no-serve --build
    ./scripts/run-dashboard-docker.sh --no-serve
    test -f claudesec-dashboard.html
    grep -q "ClaudeSec local security scanner results" claudesec-dashboard.html

    Advanced scanner examples (AWS SSO role troubleshooting, kubeconfig/prowler, Microsoft source filter, Datadog troubleshooting) are kept in:

    • docs/guides/getting-started.md
    • docs/guides/workflow-components.md
    • docs/guides/saas-best-practices-scans.md

    Datadog Required Tag Contract

    Use these required tags across CI workflow templates when querying/sending Datadog logs:

    • service:<workflow-service-name> (example: service:prowler)
    • env:ci
    • ci_pipeline_id:${{ github.run_id }}

    Contract query format:

    service:${DD_SERVICE} env:${DD_ENV} ci_pipeline_id:${CI_PIPELINE_ID}

    Datadog ingest contract (CI log intake):

    POST /v1/input?ddtags=service:${DD_SERVICE},env:${DD_ENV},ci_pipeline_id:${CI_PIPELINE_ID}

    Recommended reusable env keys in workflow templates:

    env:
      DD_SERVICE: <workflow-service-name>
      DD_ENV: ci
      CI_PIPELINE_ID: ${{ github.run_id }}

    네트워크·보안 툴 (Network & security tools)
    The dashboard includes a 네트워크·보안 툴 tab when you run the network category. It aggregates:

    • Trivy — vulnerability and misconfiguration scan (filesystem + config); results in .claudesec-network/ and in the dashboard.
    • Nmap / SSLScan — optional; enable in .claudesec.yml with network_scan_enabled: true and network_scan_targets: "host:443" (only scan hosts you are authorized to scan).

    See templates/claudesec-network.example.yml for config. Trivy runs by default when installed; Nmap/SSLScan run only when explicitly enabled and targets are set.

    Scanner Categories

    Category Checks Covers
    infra 16 Docker, Kubernetes, IaC (Terraform/Helm)
    ai 9 LLM API keys, prompt injection, RAG, agent tools
    network 5+ TLS, security headers, CORS, firewall rules; Trivy (vuln/misconfig), optional Nmap/SSLScan → dashboard tab
    cloud 13 AWS, GCP, Azure (IAM, logging, storage, network)
    access-control 6 .env files, password hashing, JWT, sessions
    cicd 8 GHA permissions, SHA pinning, SAST, lockfiles
    code 24 SQL/Command/XSS injection, SSRF, XXE, crypto, deserialization, SAST tools
    macos 20 FileVault, SIP, Gatekeeper, CIS Benchmark v4.0
    windows 20 KISA W-series, UAC, Firewall, Defender, SMBv1
    saas 33 SaaS API scanning (GitHub, Datadog, Cloudflare, Vercel, Sentry, Okta, SendGrid, Slack, PagerDuty, Jira, Grafana, New Relic, Splunk, Twilio, MongoDB Atlas, Elastic Cloud)
    prowler 16 providers Deep scan via Prowler: AWS, Azure, GCP, K8s, GitHub, M365, Google Workspace, Cloudflare, MongoDB Atlas, Oracle Cloud, Alibaba Cloud, OpenStack, NHN, IaC, LLM, Image

    Project Structure

    claudesec/
    ├── assets/              # Logo and branding (see BRANDING.md)
    ├── scanner/             # Security scanner CLI (bash, zero dependencies)
    │   ├── claudesec        # Main CLI entry point
    │   ├── lib/             # Output formatting, helper functions
    │   └── checks/          # Check modules (infra, ai, network, cloud, cicd, access-control, macos, windows, saas, prowler)
    ├── docs/
    │   ├── devsecops/       # DevSecOps practices, OWASP, supply chain, cloud, K8s
    │   ├── github/          # GitHub security features and workflows
    │   ├── ai/              # AI/LLM security, MITRE ATLAS, prompt injection
    │   ├── compliance/      # NIST CSF 2.0, ISO 27001/42001, KISA ISMS-P
    │   ├── architecture/   # Draw.io diagrams (scanner, flow, security domains)
    │   └── guides/          # Getting started, compliance mapping, branding
    ├── templates/           # GitHub Actions workflow templates, example configs
    ├── scripts/             # Security automation scripts (run, setup, run-full-dashboard)
    ├── hooks/               # Claude Code security hooks
    ├── examples/            # Example configurations
    └── .github/             # Issue templates, CI workflows

    Documentation

    DevSecOps

    Guide Description
    OWASP Top 10 2025 All 10 categories with controls and code examples
    Supply Chain Security SLSA, SBOM, Sigstore, OpenSSF Scorecard
    Cloud Security Posture CSPM with Prowler, multi-cloud checklist
    Kubernetes Security Pod security, RBAC, NetworkPolicy, runtime
    DevSecOps Pipeline End-to-end secure CI/CD pipeline
    Audit Checklist 80+ audit points for CI/CD, DB, server, K8s
    Security Maturity (SAMM) OWASP SAMM assessment and roadmap
    Threat Modeling AI-assisted STRIDE threat modeling
    Security Champions Building security culture at scale
    macOS CIS Security CIS Benchmark v4.0 hardening guide

    AI Security

    Guide Description
    OWASP LLM Top 10 2025 LLM-specific risks including agentic AI
    MITRE ATLAS AI threat framework with 66 techniques
    Prompt Injection Defense Multi-layer defense strategies
    AI Code Review OWASP-aligned AI-assisted security review
    LLM Security Checklist Pre-deployment security checklist

    GitHub Security

    Guide Description
    GitHub Security Features Dependabot, CodeQL, secret scanning
    Branch Protection Rulesets, CODEOWNERS, environment protection
    Actions Security Supply chain hardening for CI/CD
    CI Operations Playbook CodeQL default setup policy, docs prechecks, 401 retry, Dependabot conflict handling

    Compliance

    Guide Description
    NIST CSF 2.0 6 functions including new Govern, SP 800-53 control families
    ISO 27001:2022 93 controls in 4 themes, 11 new controls
    ISO 42001:2023 AI Management System (AIMS) with Annex A controls
    KISA ISMS-P 102 certification items for Korean compliance
    KISA 주요정보통신기반시설 Windows W-01W-84, Unix U-01U-72, PC-01~PC-19 (175 items)

    Guides

    Guide Description
    Getting Started Quick setup guide
    Shell Lint Policy Fixed ShellCheck scope, severity, and options policy for local and CI
    Compliance Mapping SOC 2, ISO 27001, NIST, PCI-DSS, KISA ISMS-P
    Workflow Components Reusable composite actions and template integration contract
    Hourly Operations Hourly cron automation with OpenCode pull and continuous improvement loop
    Compliance Scan Priority Prowler, Lynis, tool priorities and frameworks
    Claude Lead Agents Multi-agent roles and handoff format
    Branding Logo, colors, and visual identity

    Templates

    Ready-to-use GitHub Actions workflows:

    Template Purpose
    codeql.yml CodeQL static analysis
    dependency-review.yml Block PRs with vulnerable deps
    prowler.yml Cloud security posture scan
    security-scan-suite.yml CodeQL + Semgrep + Trivy + Gitleaks + OSV-Scanner (SARIF → Code scanning)
    sbom.yml SBOM generation + vulnerability scan + signing
    scorecard.yml OpenSSF Scorecard health check
    SECURITY.md Security policy template
    dependabot.yml Dependabot configuration

    Reusable Workflow Components

    Component Path Used by
    Token Expiry Gate .github/actions/token-expiry-gate templates/prowler.yml, templates/security-scan-suite.yml
    Datadog CI Collect .github/actions/datadog-ci-collect templates/prowler.yml, templates/security-scan-suite.yml

    Hooks

    Claude Code security hooks for real-time protection:

    Hook Trigger Purpose
    security-lint.sh PreToolUse (Write/Edit) Blocks hardcoded secrets, injection patterns
    secret-check.sh Pre-commit Prevents committing secrets
    {
      "hooks": {
        "PreToolUse": [
          {
            "matcher": "Write|Edit",
            "command": "bash hooks/security-lint.sh"
          }
        ]
      }
    }

    See hooks/README.md for details.

    ISMS Compliance Mapping

    ClaudeSec scanner checks are mapped to major compliance frameworks. Each finding includes a compliance reference for audit evidence.

    ClaudeSec Category NIST CSF 2.0 ISO 27001:2022 KISA ISMS-P SOC 2
    Code (SAST) DE.CM, PR.DS A.8.4, A.8.28 2.9, 2.11 CC6.1, CC7.1
    CI/CD PR.DS, PR.PS A.8.9, A.8.25 2.9, 2.10 CC6.6, CC8.1
    Access Control PR.AC, PR.AA A.5.15, A.8.5 2.5, 2.6 CC6.1, CC6.3
    Infrastructure PR.IP, PR.PT A.8.9, A.8.25 2.10 CC6.6, CC7.1
    Cloud ID.AM, PR.AC A.5.23, A.8.26 2.8, 2.10 CC6.6, CC6.7
    Network PR.DS, DE.CM A.8.20, A.8.21 2.10 CC6.6
    AI/LLM GV.OC, ID.RA A.5.8 (new) 2.9 CC6.1, CC7.2
    SaaS ID.AM, PR.AC A.5.23, A.8.26 2.5, 2.10 CC6.1, CC6.6
    macOS/Windows PR.IP, PR.PT A.8.1, A.8.9 2.10 CC6.6, CC6.8
    Prowler Full coverage A.8, A.5 2.5~2.11 CC6, CC7, CC8

    Full mapping details: docs/guides/compliance-mapping.md

    Supported Frameworks

    Framework Version Controls Coverage
    NIST CSF 2.0 6 Functions (GV, ID, PR, DE, RS, RC) 120+ checks mapped
    ISO 27001 2022 93 controls (4 themes) Full Annex A mapping
    ISO 42001 2023 AI Management System AI category checks
    KISA ISMS-P v3.0 102 certification items Korean compliance
    SOC 2 Type II Trust Services Criteria CC1~CC9 mapped
    CIS Benchmarks v4.0 macOS, Windows, K8s OS hardening checks
    OWASP Top 10 2025 10 categories Code + AI checks
    OWASP LLM Top 10 2025 10 LLM risks AI category

    Security Coverage Map

                        ClaudeSec Coverage
    ┌──────────────────────────────────────────────────┐
    │  PLAN          BUILD          TEST         DEPLOY │
    │  ┌──────┐     ┌──────┐     ┌──────┐     ┌──────┐│
    │  │Threat│     │Secret│     │SAST  │     │CSPM  ││
    │  │Model │     │Scan  │     │DAST  │     │IaC   ││
    │  │Design│     │SCA   │     │Pentest│    │K8s   ││
    │  │Review│     │SBOM  │     │Fuzz  │     │Cloud ││
    │  └──────┘     └──────┘     └──────┘     └──────┘│
    │                                                   │
    │  MONITOR       COMPLY        AI SAFETY            │
    │  ┌──────┐     ┌──────┐     ┌──────┐              │
    │  │Audit │     │SOC2  │     │LLM   │              │
    │  │Alert │     │ISO   │     │ATLAS │              │
    │  │SIEM  │     │NIST  │     │Agent │              │
    │  │IR    │     │PCI   │     │RAG   │              │
    │  └──────┘     └──────┘     └──────┘              │
    └──────────────────────────────────────────────────┘

    Contributing

    We welcome contributions! See CONTRIBUTING.md for guidelines.

    Areas We Need Help

    • Language-specific security guides (Python, Go, Rust, Java)
    • Additional CI/CD integrations (GitLab CI, Azure DevOps)
    • Real-world case studies and incident post-mortems
    • Translations (i18n) — especially Korean, Japanese, Chinese
    • Custom CodeQL queries and Semgrep rules
    • Kubernetes admission policies (Kyverno/OPA)

    Acknowledgments

    Support this project

    If ClaudeSec helps your DevSecOps or AI-assisted security workflow, consider giving it a star on GitHub — it helps others discover the project.

    Star on GitHub

    Star History

    Star History Chart

    License

    MIT License — see LICENSE for details.