Security Components
The Security category includes agents, commands, and hooks focused on application security, vulnerability detection, secrets management, and security best practices.Browse Security Components
Explore all security components at aitmpl.com
Quick Install
Security Commands
Security Audit
Comprehensive security assessment and vulnerability analysisWhat it checks:Usage:Output includes:
- Dependency vulnerabilities
- Authentication & authorization
- Input validation & sanitization
- Data protection & encryption
- Secrets management
- Error handling & logging
- Infrastructure security
- Security headers & CORS
- Severity levels (Critical, High, Medium, Low)
- Specific file references
- Remediation steps
- Code examples
Secrets Scanner
Scan codebase for hardcoded secrets, API keys, and credentialsDetects:Usage:
- API keys and tokens
- Database passwords
- Private keys and certificates
- OAuth secrets
- Cloud provider credentials
- Slack/Discord webhooks
Dependency Audit
Check dependencies for known vulnerabilities using npm audit, pip check, etc.
Security Hardening
Apply security best practices to your applicationApplies:
- Security headers
- CORS configuration
- Input validation
- Rate limiting
- CSP policies
- Cookie security
Penetration Test
Automated penetration testing workflows
Add Authentication System
Add secure authentication to your applicationOptions:
- JWT authentication
- OAuth2 integration
- Session management
- Password hashing (bcrypt, argon2)
- MFA/2FA support
Security Hooks
- Secret Protection
- Command Safety
- File Protection
- Security Scanning
Prevent Secret Leaks
Secret Scanner Hook
Automatically scan commits for secrets before they’re pushedHow it works:Detects:Example Output:
- Runs before each commit (pre-commit hook)
- Scans all staged files for secret patterns
- Blocks commit if secrets are detected
- Shows which files and lines contain secrets
Security Settings
Read-Only Mode
Restrict Claude Code to read-only operationsBlocks:
- File writes and edits
- Git commits and pushes
- Bash commands that modify files
- Destructive operations
- Code review mode
- Production environment analysis
- Learning from existing codebases
- Untrusted environments
Restricted Bash
Limit bash command execution to safe operations
Disable Risky MCP Servers
Disable MCP servers with dangerous capabilities
Security Agents
Security Engineer
Security engineering specialist (part of DevOps Infrastructure category)Expertise:
- Security architecture
- Threat modeling
- Secure coding practices
- Security testing
- Incident response
Security Workflows
Pre-Commit Security
Automatic security checks before every commit:Regular Security Audits
Schedule comprehensive security audits:Security Hardening
Apply security best practices to new projects:Secrets Management
Never commit secrets:Security Best Practices
1. Defense in Depth
Layer multiple security controls:2. Automated Security
Automate security checks in CI/CD:3. Regular Audits
Schedule regular security reviews:4. Least Privilege
Restrict permissions when possible:Security Template
Use the pre-configured security template:- Security audit command
- Secret scanner hook
- Dangerous command blocker
- File protection hook
- Read-only mode setting
- Branch protection
- Security engineer agent