CLAUDE.md Security Auditor — Scan AI Agent Configs avatar

CLAUDE.md Security Auditor — Scan AI Agent Configs

Pricing

Pay per usage

Go to Apify Store
CLAUDE.md Security Auditor — Scan AI Agent Configs

CLAUDE.md Security Auditor — Scan AI Agent Configs

Scan any GitHub repo's CLAUDE.md + .claude/hooks/* for hardcoded secrets, prompt-injection patterns, destructive commands, and AI-agent security antipatterns. Free triage, paid full audit.

Pricing

Pay per usage

Rating

0.0

(0)

Developer

Yanlong Mu

Yanlong Mu

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

4 hours ago

Last modified

Share

CLAUDE.md Security Auditor

Scan any AI agent project's CLAUDE.md, settings, and hooks for security antipatterns — secrets, prompt-injection, destructive commands, exfil channels.

What does this Actor do?

This Actor takes a GitHub repository URL (or pasted CLAUDE.md content) and produces a security audit report flagging:

  • Hardcoded secrets: Anthropic / OpenAI / GitHub / AWS / Supabase / Slack tokens that should be env vars
  • Prompt-injection vectors: bypass-permissions, --dangerously-skip-permissions, "ignore previous instructions" patterns
  • Destructive command exec: rm -rf $HOME, sudo rm, curl | sh, eval $var in hook scripts
  • Permission antipatterns: chmod 777, world-writable assets
  • Exfiltration channels: outbound curl / wget to dynamic webhook endpoints (webhook.site, requestbin, ngrok)

Output: structured JSON findings + downloadable Markdown report ranked by severity (critical/high/medium/low).

Why use this Actor?

CLAUDE.md and .claude/hooks/* are the new attack surface. Anyone who can edit them controls what Claude Code does on the user's machine. The 2026 trend of "agent skills marketplaces" + "plugin distribution" means you're going to be installing other people's CLAUDE.md and hooks — and most of them aren't audited.

Use cases:

  • Pre-install audit: scan a community CLAUDE.md / plugin / skill before installing it locally
  • CI/CD gate: run this Actor on every PR that touches CLAUDE.md or .claude/
  • Team standardization: audit all repos in your org for AI-agent hygiene
  • Personal hygiene: scan your own configs to catch the time you committed a sk-ant- token by accident

How to use

  1. Paste a GitHub repo as owner/repo (e.g. anthropics/claude-code) into the GitHub repo field, OR paste your CLAUDE.md content into the textarea
  2. (Optional) Paste concatenated hook scripts into the second textarea
  3. Click Start
  4. View results in the Output tab, or download the full Markdown report from the Storage tab → Key-Value Store → security-report.md

Input

  • githubRepoowner/repo format. Public repos only (no GitHub auth needed; rate-limited to 60 req/hour from anonymous IPs)
  • claudeMdContent — paste CLAUDE.md content directly (use if your repo is private)
  • hooksDirContent — paste concatenated hook scripts for additional scanning

Output

{
"repo": "anthropics/claude-code",
"audited_at": "2026-05-20T15:30:00.000Z",
"summary": {
"files_scanned": 4,
"total_findings": 7,
"by_severity": {
"critical": 1,
"high": 2,
"medium": 3,
"low": 1
}
},
"findings": [
{
"path": ".claude/hooks/deploy.sh",
"line": 23,
"severity": "critical",
"category": "secret",
"message": "Hardcoded Anthropic API key",
"matched": "sk-ant-api03-Abc...",
"context": "ANTHROPIC_API_KEY=sk-ant-api03-Abc..."
}
]
}

Each finding includes file path, line number, severity, category, the matched string, and surrounding context.

Severity scale

SeverityExamplesAction
🔴 CriticalHardcoded API keys / tokens / private keysRotate immediately, never commit
🟠 HighPrompt-injection patterns, rm -rf $HOME, curl | sh, JWT in codeFix before merging
🟡 Mediumchmod 777, eval $var, suspicious outbound URLsReview and remediate
⚪ LowTODO comments in security-sensitive filesOptional cleanup

Pricing

Pay-per-event model on Apify:

  • First audit: free trial
  • Per-audit rate: $0.25 per repo audit
  • What you get: JSON findings + Markdown report + 7-day result retention

Need a full team audit + remediation PR? See the author's $499 Custom Hook Development service at landing-ianymu.vercel.app.

FAQ

Does this Actor have false positives?

Yes — particularly on the "prompt-injection" patterns. A doc that explains the pattern (e.g., "do NOT use --dangerously-skip-permissions") will trigger. Review every finding before acting.

Does this scan private repos?

Not directly. For private repos, paste the contents into the claudeMdContent / hooksDirContent textareas. The Actor only sees what you paste; it does not store inputs outside the run's transient storage.

What about the bypass-permissions flag — is that always bad?

It loses Claude Code's per-tool approval prompts, which is the primary safety layer for autonomous agents. The Actor flags it because most users don't know they're enabling it. There are legitimate uses (sandboxed CI environments), but they should be explicit.

Why is this important now?

CLAUDE.md and .claude/hooks/* are the only files that determine what Claude Code does autonomously on your machine. As skill/plugin distribution accelerates, you're going to install other people's configs. Scanning them is the same hygiene as scanning package.json for known vulnerabilities — and almost nobody does it yet.

Support

Issues / feature requests: open in the Issues tab on the Apify console for this Actor.

Built by Ian Mu — github.com/ianymu — also author of verify-before-stop, the open-source Claude Code Stop hook against false completion claims.