claudesec
v0.6.1
Published
DevSecOps toolkit for AI-assisted secure development — security scanner, ISMS dashboard, asset management
Maintainers
Readme
ClaudeSec
AI Security Best Practices toolkit for secure development with Claude Code
ClaudeSec integrates security best practices directly into your AI-powered development workflow. It provides security-focused prompts, hooks, templates, and guides designed for use with Claude Code and CI/CD pipelines.
Quick Start
npx (no install)
npx claudesec scan # Security scan — no install needed
npx claudesec dashboard # Full scan + dashboardGit clone + Docker
git clone https://github.com/Twodragon0/claudesec.git
cd claudesec
./scripts/quick-start.sh # Docker build + scan + serveClaude Code slash commands
/scan # Run security scan
/dashboard # Build + serve dashboard
/audit # Full security audit
/team-scan # Parallel multi-agent scan
/security-review # Pre-commit security checkDashboard serves at http://localhost:11777/
Options
npx claudesec scan # Scan only
npx claudesec dashboard # Full scan + dashboard
./scripts/quick-start.sh --scan-only # Docker scan only
./scripts/quick-start.sh --serve # Serve existing dashboardAsset Management Dashboard (optional — requires API keys)
cp .env.example ~/Desktop/.env # Edit with your API keys
./scripts/setup.sh # Install hooks + templates
source .venv-asset/bin/activate
python3 scripts/build-dashboard.py # Build asset dashboard
docker compose up dashboard -d # Serve on localhost:11777Requires: Docker Desktop. See .env.example for API key setup.
| Command | What it does |
|--------|----------------|
| ./run | Full scan + dashboard + serve at localhost:11777 (safe mode: --kill-port) |
| ./run --no-serve | Full scan + dashboard only (no server) |
| ./run --quick | Quick scan (3 categories) + dashboard + serve |
| ./run --docker | Full scan + dashboard in Docker (publishes localhost:11777) |
| ./scripts/run-dashboard-safe.sh | Full scan + serve with automatic port fallback/cleanup options |
Or run the script directly:
./scripts/run-full-dashboard.sh # full + serve
./scripts/run-full-dashboard.sh --no-serve # full, no server
./scripts/run-full-dashboard.sh --quick # quick + serve
./scripts/run-dashboard-safe.sh # full + serve (auto fallback port when 11777 is busy)
./scripts/run-dashboard-safe.sh --kill-port # full + serve (terminate process occupying 11777)
./scripts/run-dashboard-safe.sh --docker # run dashboard workflow in DockerDocker Run
The default image runs local scanner categories (code, access-control, infra, cicd, saas, etc.) and now includes kubectl + prowler CLI so -c prowler / Kubernetes scans can also run inside Docker (assuming you mount credentials/kubeconfig). For production-grade cloud/K8s scanning, prefer running on the host with --kubeconfig and AWS/GCP/Azure SSO profiles, or use a hardened custom image that adds your org-specific tooling.
# Build image once (or let wrappers auto-build)
docker build -t claudesec:local .
# Dashboard flow in Docker
./run --docker
./run --docker --no-serve
./run --docker --quick
# Scanner flow in Docker
./scripts/run-scan-docker.sh
./scripts/run-scan-docker.sh -c code
./scripts/run-scan-docker.sh -c infra
./scripts/run-scan-docker.sh -c access-controlRecommended day-to-day flow:
./scripts/run-dashboard-safe.sh --kill-port # avoid port-conflict / stale-server issues
./run --quick # fast smoke check
./run --no-serve # final full scan artifact generation
grep -q "ClaudeSec local security scanner results" claudesec-dashboard.htmlNot sure where to start?
From the repo root, run ./run. The first run may take a few minutes (full scan); use ./run --quick for a faster try with 3 categories. For container-first validation, run ./run --docker --no-serve and check claudesec-dashboard.html.
Why ClaudeSec?
AI coding assistants accelerate development — but speed without security creates risk. ClaudeSec bridges this gap:
- Shift-left security: Catch vulnerabilities before they reach production
- AI-native guardrails: Security hooks and prompts designed for Claude Code workflows
- AI Security automation: GitHub Actions, pre-commit hooks, and CI/CD templates
- SaaS security scanning: Datadog, Cloudflare, Vercel, ArgoCD, Sentry, Okta, SendGrid, and more
- Supply chain integrity: SLSA, SBOM, and artifact signing workflows
- Compliance mapping: SOC 2, ISO 27001, NIST, PCI-DSS, KISA ISMS-P, KISA 주요정보통신기반시설
- Living documentation: Actionable guides for OWASP Top 10, MITRE ATLAS, and more
ISMS Asset & Security Dashboard
ClaudeSec provides an ISMS PDCA-based integrated dashboard that combines security scanning, asset management, and vulnerability assessment into a single view.
One Command — Full Asset Scan + Dashboard
# Full: security scan + asset collection + dashboard build + Docker serve
./run-all.sh
# Quick scan only (code, infra, cicd)
./run-all.sh --quick
# Include AWS infrastructure collection
./run-all.sh --aws
# Build dashboard only (skip scan)
./run-all.sh --build-onlyDashboard served at http://localhost:11777 (Docker) with 9 tabs:
| Tab | Data Sources | Description | |-----|-------------|-------------| | ISMS PDCA | All sources | Plan/Do/Check/Act cycle with scores | | ClaudeSec Scan | Scanner | Code, infra, CI/CD, AI security checks | | Security | Prowler, Datadog SIEM | Vulnerability findings, severity distribution | | Asset Management | Sheets, SentinelOne, Jamf | PC/endpoint inventory, EDR cross-verification | | Infrastructure | AWS, Datadog | EC2, RDS, ElastiCache, Karpenter node detection | | SaaS & License | Sheets | SaaS inventory, auth method analysis, license tracking | | Cost Analysis | xlsx | Monthly SaaS spending by software/department | | AI Subscription | Sheets | AI service usage (Claude, GPT, Cursor, etc.) | | Security Signals | Datadog SIEM, Notion | 14-day alerts + security audit history |
Data Collection
The dashboard aggregates data from multiple sources:
Data Sources Collection Method
─────────────────────────────────────────────────
Datadog API Hosts, SIEM signals, SentinelOne logs
Google Sheets API Asset registry, SaaS, licenses
Google Drive API (xlsx) SaaS cost/spending data
AWS CLI (describe) EC2, RDS, ElastiCache, S3, EKS
Prowler (K8s Job) CIS benchmark, security checks
Notion API Security audit history
ClaudeSec Scanner Code, infra, CI/CD, AI checksCross-Verification
Automatically detects discrepancies between data sources:
- EC2 cross-verify: AWS live instances vs asset registry (Karpenter dynamic nodes auto-excluded)
- Endpoint cross-verify: Jamf MDM vs SentinelOne EDR (identifies devices missing protection)
- SaaS auth audit: Identifies ID/PW-only services that need SSO migration
Configuration
# Required: Google OAuth (first-time browser auth)
pip install gspread google-auth google-auth-oauthlib openpyxl
# Required: Datadog API keys in ~/Desktop/.env
# datadog_key_credential=<API_KEY>
# datadog_app_key_credential=<APP_KEY>
# Optional: AWS profiles for infrastructure collection
# Requires valid AWS CLI sessions (SSO or credentials)
# Optional: Prowler K8s CronJob (weekly scan)
kubectl apply -f .claudesec-prowler/prowler-rbac.yaml --context <dev-cluster>
kubectl apply -f .claudesec-prowler/prowler-cronjob.yaml --context <dev-cluster>Docker
# Start dashboard (nginx, port 11777)
docker compose up -d dashboard
# Endpoints:
# http://localhost:11777 → ISMS Dashboard
# http://localhost:11777/scan.html → ClaudeSec Scan DashboardDirectory Structure
claudesec/
├── run-all.sh # One-command: scan + build + serve
├── scripts/
│ ├── build-dashboard.py # Dashboard data collection & HTML build
│ ├── asset-gsheet-sync.py # Google Sheets sync
│ ├── collect-assets.sh # Multi-source asset collector
│ ├── run-prowler-k8s.sh # Prowler K8s scan (CronJob-based)
│ └── full-asset-sync.py # Full sync to Google Sheets
├── claudesec-asset-dashboard.html # Dashboard template (no data)
├── .claudesec-prowler/
│ ├── prowler-rbac.yaml # K8s ServiceAccount + ClusterRole
│ └── prowler-cronjob.yaml # Weekly Prowler CronJob
├── scanner/ # ClaudeSec security scanner
├── docker-compose.yml # Docker stack
└── Dockerfile.nginx # Dashboard servingPrivacy: All scan results, asset data, and dashboard files with real data are in
.gitignore. Only templates and scripts are committed. No PII, company info, or credentials are included in the repository.
Scanner CLI
ClaudeSec includes a zero-dependency bash scanner that checks your project for security best practices across 10 categories (~120+ checks). Optionally integrates with Prowler for deep multi-cloud scanning.
Scanner anchors
Scanner Quick Start
# From repo root
./scripts/run-scan.sh
./scripts/run-scan.sh --docker
# Direct CLI
./scanner/claudesec scan -d .
./scanner/claudesec scan --category cloud
./scanner/claudesec scan --severity high,critical
./scanner/claudesec scan --format jsonScanner CI Templates
# Prowler deep scan (requires prowler)
./scanner/claudesec scan -c prowler --aws-profile audit
# AWS SSO all profiles
./scanner/claudesec scan -c prowler --aws-sso-all
AWS_SSO_LOGIN_TIMEOUT=20 CLAUDESEC_CI=1 CI=true ./scanner/claudesec scan -c prowler --aws-sso-all -f json
# Strict SSO mode for templates/prowler.yml
# vars.CLAUDESEC_STRICT_SSO=1
# Token-expiry gate vars for templates/prowler.yml / templates/security-scan-suite.yml
# vars.GH_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
# vars.OKTA_OAUTH_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
# vars.CLAUDESEC_TOKEN_EXPIRY_GATE_MODE=24h
# vars.CLAUDESEC_TOKEN_EXPIRY_PROVIDERS=github,okta,datadog,slack
# vars.CLAUDESEC_TOKEN_EXPIRY_STRICT_PROVIDERS=true
# vars.CLAUDESEC_DD_ARTIFACT_RETENTION_DAYS=30 # valid range: 1-90Reusable workflow components:
.github/actions/token-expiry-gate.github/actions/datadog-ci-collect
Scanner OAuth and Token Policy
Okta recommends scoped OAuth 2.0 access tokens over SSWS API tokens for automation.
- Preferred:
OKTA_OAUTH_TOKEN - Fallback:
OKTA_API_TOKEN - Strict scope check:
CLAUDESEC_STRICT_OKTA_SCOPES=1 - Required scopes override:
CLAUDESEC_OKTA_REQUIRED_SCOPES
export OKTA_ORG_URL="https://dev-123456.okta.com"
export OKTA_OAUTH_TOKEN="<okta-oauth-access-token>"
export GH_TOKEN="<github-token>"
export CLAUDESEC_OKTA_REQUIRED_SCOPES="okta.users.read,okta.policies.read,okta.logs.read"
export CLAUDESEC_STRICT_OKTA_SCOPES=1
./scanner/claudesec scan -c saasScanner SaaS Live Scan
# SaaS API scan
./scanner/claudesec scan -c saas
# Dashboard with token expiry windows
export OKTA_OAUTH_TOKEN_EXPIRES_AT="2026-03-13T09:00:00Z"
export GH_TOKEN_EXPIRES_AT="2026-03-13T08:30:00Z"
export CLAUDESEC_TOKEN_EXPIRY_WARNING_24H="24h"
export CLAUDESEC_TOKEN_EXPIRY_WARNING_7D="7d"
./scanner/claudesec dashboard --serve --host 127.0.0.1 --port 11665
# Optional: populate OAuth readiness cards via ~/.claudesec.env (auto-loaded)
cat > ~/.claudesec.env <<'EOF'
GH_TOKEN=<github-token>
GITHUB_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
OKTA_OAUTH_TOKEN=<okta-oauth-token>
OKTA_OAUTH_TOKEN_EXPIRES_AT=2026-03-20T09:00:00Z
EOF
./run --no-serve
# Datadog local auto-fetch
DD_API_KEY=<your-dd-api-key> DD_APP_KEY=<your-dd-app-key> DD_SITE=datadoghq.com ./scanner/claudesec dashboardCI reproducibility check (dashboard regression gate)
Use a deterministic check in CI to catch dashboard generation regressions:
./scripts/run-dashboard-docker.sh --quick --no-serve --build
./scripts/run-dashboard-docker.sh --no-serve
test -f claudesec-dashboard.html
grep -q "ClaudeSec local security scanner results" claudesec-dashboard.htmlAdvanced scanner examples (AWS SSO role troubleshooting, kubeconfig/prowler, Microsoft source filter, Datadog troubleshooting) are kept in:
docs/guides/getting-started.mddocs/guides/workflow-components.mddocs/guides/saas-best-practices-scans.md
Datadog Required Tag Contract
Use these required tags across CI workflow templates when querying/sending Datadog logs:
service:<workflow-service-name>(example:service:prowler)env:cici_pipeline_id:${{ github.run_id }}
Contract query format:
service:${DD_SERVICE} env:${DD_ENV} ci_pipeline_id:${CI_PIPELINE_ID}Datadog ingest contract (CI log intake):
POST /v1/input?ddtags=service:${DD_SERVICE},env:${DD_ENV},ci_pipeline_id:${CI_PIPELINE_ID}Recommended reusable env keys in workflow templates:
env:
DD_SERVICE: <workflow-service-name>
DD_ENV: ci
CI_PIPELINE_ID: ${{ github.run_id }}네트워크·보안 툴 (Network & security tools)
The dashboard includes a 네트워크·보안 툴 tab when you run the network category. It aggregates:
- Trivy — vulnerability and misconfiguration scan (filesystem + config); results in
.claudesec-network/and in the dashboard. - Nmap / SSLScan — optional; enable in
.claudesec.ymlwithnetwork_scan_enabled: trueandnetwork_scan_targets: "host:443"(only scan hosts you are authorized to scan).
See templates/claudesec-network.example.yml for config. Trivy runs by default when installed; Nmap/SSLScan run only when explicitly enabled and targets are set.
Scanner Categories
| Category | Checks | Covers |
|----------|--------|--------|
| infra | 16 | Docker, Kubernetes, IaC (Terraform/Helm) |
| ai | 9 | LLM API keys, prompt injection, RAG, agent tools |
| network | 5+ | TLS, security headers, CORS, firewall rules; Trivy (vuln/misconfig), optional Nmap/SSLScan → dashboard tab |
| cloud | 13 | AWS, GCP, Azure (IAM, logging, storage, network) |
| access-control | 6 | .env files, password hashing, JWT, sessions |
| cicd | 8 | GHA permissions, SHA pinning, SAST, lockfiles |
| code | 24 | SQL/Command/XSS injection, SSRF, XXE, crypto, deserialization, SAST tools |
| macos | 20 | FileVault, SIP, Gatekeeper, CIS Benchmark v4.0 |
| windows | 20 | KISA W-series, UAC, Firewall, Defender, SMBv1 |
| saas | 33 | SaaS API scanning (GitHub, Datadog, Cloudflare, Vercel, Sentry, Okta, SendGrid, Slack, PagerDuty, Jira, Grafana, New Relic, Splunk, Twilio, MongoDB Atlas, Elastic Cloud) |
| prowler | 16 providers | Deep scan via Prowler: AWS, Azure, GCP, K8s, GitHub, M365, Google Workspace, Cloudflare, MongoDB Atlas, Oracle Cloud, Alibaba Cloud, OpenStack, NHN, IaC, LLM, Image |
Project Structure
claudesec/
├── assets/ # Logo and branding (see BRANDING.md)
├── scanner/ # Security scanner CLI (bash, zero dependencies)
│ ├── claudesec # Main CLI entry point
│ ├── lib/ # Output formatting, helper functions
│ └── checks/ # Check modules (infra, ai, network, cloud, cicd, access-control, macos, windows, saas, prowler)
├── docs/
│ ├── devsecops/ # DevSecOps practices, OWASP, supply chain, cloud, K8s
│ ├── github/ # GitHub security features and workflows
│ ├── ai/ # AI/LLM security, MITRE ATLAS, prompt injection
│ ├── compliance/ # NIST CSF 2.0, ISO 27001/42001, KISA ISMS-P
│ ├── architecture/ # Draw.io diagrams (scanner, flow, security domains)
│ └── guides/ # Getting started, compliance mapping, branding
├── templates/ # GitHub Actions workflow templates, example configs
├── scripts/ # Security automation scripts (run, setup, run-full-dashboard)
├── hooks/ # Claude Code security hooks
├── examples/ # Example configurations
└── .github/ # Issue templates, CI workflowsDocumentation
- Branding — Logo and visual identity (docs/branding.md)
DevSecOps
| Guide | Description | |-------|-------------| | OWASP Top 10 2025 | All 10 categories with controls and code examples | | Supply Chain Security | SLSA, SBOM, Sigstore, OpenSSF Scorecard | | Cloud Security Posture | CSPM with Prowler, multi-cloud checklist | | Kubernetes Security | Pod security, RBAC, NetworkPolicy, runtime | | DevSecOps Pipeline | End-to-end secure CI/CD pipeline | | Audit Checklist | 80+ audit points for CI/CD, DB, server, K8s | | Security Maturity (SAMM) | OWASP SAMM assessment and roadmap | | Threat Modeling | AI-assisted STRIDE threat modeling | | Security Champions | Building security culture at scale | | macOS CIS Security | CIS Benchmark v4.0 hardening guide |
AI Security
| Guide | Description | |-------|-------------| | OWASP LLM Top 10 2025 | LLM-specific risks including agentic AI | | MITRE ATLAS | AI threat framework with 66 techniques | | Prompt Injection Defense | Multi-layer defense strategies | | AI Code Review | OWASP-aligned AI-assisted security review | | LLM Security Checklist | Pre-deployment security checklist |
GitHub Security
| Guide | Description | |-------|-------------| | GitHub Security Features | Dependabot, CodeQL, secret scanning | | Branch Protection | Rulesets, CODEOWNERS, environment protection | | Actions Security | Supply chain hardening for CI/CD | | CI Operations Playbook | CodeQL default setup policy, docs prechecks, 401 retry, Dependabot conflict handling |
Compliance
| Guide | Description | |-------|-------------| | NIST CSF 2.0 | 6 functions including new Govern, SP 800-53 control families | | ISO 27001:2022 | 93 controls in 4 themes, 11 new controls | | ISO 42001:2023 | AI Management System (AIMS) with Annex A controls | | KISA ISMS-P | 102 certification items for Korean compliance | | KISA 주요정보통신기반시설 | Windows W-01~W-84, Unix U-01~U-72, PC-01~PC-19 (175 items) |
Guides
| Guide | Description | |-------|-------------| | Getting Started | Quick setup guide | | Shell Lint Policy | Fixed ShellCheck scope, severity, and options policy for local and CI | | Compliance Mapping | SOC 2, ISO 27001, NIST, PCI-DSS, KISA ISMS-P | | Workflow Components | Reusable composite actions and template integration contract | | Hourly Operations | Hourly cron automation with OpenCode pull and continuous improvement loop | | Compliance Scan Priority | Prowler, Lynis, tool priorities and frameworks | | Claude Lead Agents | Multi-agent roles and handoff format | | Branding | Logo, colors, and visual identity |
Templates
Ready-to-use GitHub Actions workflows:
| Template | Purpose | |----------|---------| | codeql.yml | CodeQL static analysis | | dependency-review.yml | Block PRs with vulnerable deps | | prowler.yml | Cloud security posture scan | | security-scan-suite.yml | CodeQL + Semgrep + Trivy + Gitleaks + OSV-Scanner (SARIF → Code scanning) | | sbom.yml | SBOM generation + vulnerability scan + signing | | scorecard.yml | OpenSSF Scorecard health check | | SECURITY.md | Security policy template | | dependabot.yml | Dependabot configuration |
Reusable Workflow Components
| Component | Path | Used by |
|----------|------|---------|
| Token Expiry Gate | .github/actions/token-expiry-gate | templates/prowler.yml, templates/security-scan-suite.yml |
| Datadog CI Collect | .github/actions/datadog-ci-collect | templates/prowler.yml, templates/security-scan-suite.yml |
Hooks
Claude Code security hooks for real-time protection:
| Hook | Trigger | Purpose | |------|---------|---------| | security-lint.sh | PreToolUse (Write/Edit) | Blocks hardcoded secrets, injection patterns | | secret-check.sh | Pre-commit | Prevents committing secrets |
{
"hooks": {
"PreToolUse": [
{
"matcher": "Write|Edit",
"command": "bash hooks/security-lint.sh"
}
]
}
}See hooks/README.md for details.
ISMS Compliance Mapping
ClaudeSec scanner checks are mapped to major compliance frameworks. Each finding includes a compliance reference for audit evidence.
| ClaudeSec Category | NIST CSF 2.0 | ISO 27001:2022 | KISA ISMS-P | SOC 2 | |-------------------|-------------|----------------|-------------|-------| | Code (SAST) | DE.CM, PR.DS | A.8.4, A.8.28 | 2.9, 2.11 | CC6.1, CC7.1 | | CI/CD | PR.DS, PR.PS | A.8.9, A.8.25 | 2.9, 2.10 | CC6.6, CC8.1 | | Access Control | PR.AC, PR.AA | A.5.15, A.8.5 | 2.5, 2.6 | CC6.1, CC6.3 | | Infrastructure | PR.IP, PR.PT | A.8.9, A.8.25 | 2.10 | CC6.6, CC7.1 | | Cloud | ID.AM, PR.AC | A.5.23, A.8.26 | 2.8, 2.10 | CC6.6, CC6.7 | | Network | PR.DS, DE.CM | A.8.20, A.8.21 | 2.10 | CC6.6 | | AI/LLM | GV.OC, ID.RA | A.5.8 (new) | 2.9 | CC6.1, CC7.2 | | SaaS | ID.AM, PR.AC | A.5.23, A.8.26 | 2.5, 2.10 | CC6.1, CC6.6 | | macOS/Windows | PR.IP, PR.PT | A.8.1, A.8.9 | 2.10 | CC6.6, CC6.8 | | Prowler | Full coverage | A.8, A.5 | 2.5~2.11 | CC6, CC7, CC8 |
Full mapping details: docs/guides/compliance-mapping.md
Supported Frameworks
| Framework | Version | Controls | Coverage | |-----------|---------|----------|----------| | NIST CSF | 2.0 | 6 Functions (GV, ID, PR, DE, RS, RC) | 120+ checks mapped | | ISO 27001 | 2022 | 93 controls (4 themes) | Full Annex A mapping | | ISO 42001 | 2023 | AI Management System | AI category checks | | KISA ISMS-P | v3.0 | 102 certification items | Korean compliance | | SOC 2 | Type II | Trust Services Criteria | CC1~CC9 mapped | | CIS Benchmarks | v4.0 | macOS, Windows, K8s | OS hardening checks | | OWASP | Top 10 2025 | 10 categories | Code + AI checks | | OWASP LLM | Top 10 2025 | 10 LLM risks | AI category |
Security Coverage Map
ClaudeSec Coverage
┌──────────────────────────────────────────────────┐
│ PLAN BUILD TEST DEPLOY │
│ ┌──────┐ ┌──────┐ ┌──────┐ ┌──────┐│
│ │Threat│ │Secret│ │SAST │ │CSPM ││
│ │Model │ │Scan │ │DAST │ │IaC ││
│ │Design│ │SCA │ │Pentest│ │K8s ││
│ │Review│ │SBOM │ │Fuzz │ │Cloud ││
│ └──────┘ └──────┘ └──────┘ └──────┘│
│ │
│ MONITOR COMPLY AI SAFETY │
│ ┌──────┐ ┌──────┐ ┌──────┐ │
│ │Audit │ │SOC2 │ │LLM │ │
│ │Alert │ │ISO │ │ATLAS │ │
│ │SIEM │ │NIST │ │Agent │ │
│ │IR │ │PCI │ │RAG │ │
│ └──────┘ └──────┘ └──────┘ │
└──────────────────────────────────────────────────┘Contributing
We welcome contributions! See CONTRIBUTING.md for guidelines.
Areas We Need Help
- Language-specific security guides (Python, Go, Rust, Java)
- Additional CI/CD integrations (GitLab CI, Azure DevOps)
- Real-world case studies and incident post-mortems
- Translations (i18n) — especially Korean, Japanese, Chinese
- Custom CodeQL queries and Semgrep rules
- Kubernetes admission policies (Kyverno/OPA)
Acknowledgments
- Cloud security patterns from prowler-cloud/prowler
- Audit framework informed by querypie/audit-points
- Web security based on OWASP Top 10 2025
- AI security guidance from MITRE ATLAS and OWASP LLM Top 10
- Built for the Claude Code ecosystem
Support this project
If ClaudeSec helps your DevSecOps or AI-assisted security workflow, consider giving it a star on GitHub — it helps others discover the project.
Star History
License
MIT License — see LICENSE for details.
