@hasna/security
v0.1.10
Published
AI-powered security scanner for git repos — CLI, MCP, API, Web Dashboard, SDK with Cerebras LLM
Downloads
1,178
Maintainers
Readme
@hasna/security
AI-powered security scanner for git repos with supply chain attack detection.
Install
npm install -g @hasna/security
# or
bun install -g @hasna/securityQuick Start
# Scan your repo for security issues
security scan .
# Check if a package is compromised (axios/litellm/Trivy supply chain attacks)
security check-package axios 1.14.1
security check-package litellm 1.82.8 --ecosystem pypi
# List known supply chain attack advisories
security advisories
# Quick scan (secrets + dependencies only)
security scan . --quickScanners
9 built-in scanners:
| Scanner | What it finds |
|---------|--------------|
| secrets | API keys, tokens, high-entropy strings |
| dependencies | CVEs via OSV.dev (npm, PyPI, Go, Rust) |
| code | SQL injection, XSS, command injection, path traversal |
| git-history | Secrets committed in git history |
| config | Insecure CORS, debug mode, missing security headers |
| ai-safety | Prompt injection, PII exposure, unsafe tool use |
| ioc | Supply chain attack indicators (C2 domains, RAT artifacts, malicious packages) |
| lockfile | Compromised locked versions, unpinned ranges during attack windows |
| supply-chain | Typosquatting, postinstall exploits, GitHub Actions tag hijacking |
Supply Chain Attack Detection
The IOC scanner checks against a built-in advisory database of known attacks:
- [email protected]/0.30.4 (March 31, 2026) — maintainer account hijack, RAT dropper via
plain-crypto-js - [email protected]/1.82.8 (March 24, 2026) — TeamPCP CI/CD compromise via poisoned Trivy,
.pthfile persistence - Trivy v0.69.4 (March 19, 2026) — TeamPCP tag hijack, 76 version tags force-pushed
- Checkmarx KICS/AST (March 23, 2026) — TeamPCP tag hijack using stolen CI/CD credentials
# Run IOC scan
security scan . --scanner ioc
# Run lockfile forensics
security scan . --scanner lockfile
# Full supply chain check
security scan . --scanner supply-chainAlert Pipeline
Configure alerts for new supply chain detections:
# Check alert status
security alerts status
# Test alerts with a known advisory
security alerts test
# Enable alerts (min severity: critical)
security alerts enableSupports: Slack, Discord, Webhook, Twitter/X, Email
# Set via environment variables
export SECURITY_SLACK_WEBHOOK_URL=https://hooks.slack.com/...
export SECURITY_DISCORD_WEBHOOK_URL=https://discord.com/api/webhooks/...
export SECURITY_WEBHOOK_URL=https://your-api.example.com/webhookMCP Server (for AI agents)
# Install for Claude Code
security mcp --claude
# Install for all agents
security mcp --all32 tools available including check_package, scan_repo, list_advisories, get_advisory.
REST API + Dashboard
security serve
# Opens at http://localhost:19428Dashboard pages: Dashboard, Feed (live advisory feed), Package Lookup, Attack Timeline, Findings, Scans, Rules, Projects.
API endpoints:
GET /api/advisories— list known supply chain advisoriesGET /api/check-package?name=axios&version=1.14.1— check package safetyGET /api/findings— query scan findingsPOST /api/scans— trigger a new scan
All CLI Commands
security scan [path] Run security scan
security findings List findings
security explain <id> AI explanation for a finding
security fix <id> AI-suggested fix
security review Review staged git changes
security init Initialize for this repo
security baseline Mark findings as baseline
security score Show security score
security check-package <name> Check if package is compromised
security advisories List supply chain advisories
security alerts status|test|... Manage alert channels
security mcp --claude|--all Install MCP server
security serve Start web dashboardData
Stored in ~/.hasna/security/ (override with SECURITY_DB env var).
Cloud Sync
cloud sync push --service security
cloud sync pull --service securityLicense
Apache-2.0 — see LICENSE
