Install
openclaw skills install ai-supply-chain-securityCross-platform AI security scanner detecting hooks risks, MCP server attacks, prompt injection, supply chain threats in npm, PyPI, Rust, and GitHub Actions c...
openclaw skills install ai-supply-chain-securityCross-platform AI Coding security scanner for OpenClaw and Claude Code, detecting hooks configuration risks, MCP server attacks, prompt injection, and supply chain attacks (npm/PyPI/Rust).
name: ai-supply-chain-security
version: 2.1.0
description: Cross-platform AI Coding security scanner - Detect hooks, MCP servers, prompt injection, supply chain attacks, lock file poisoning, and registry substitution attacks
author: JavaMaGong
platforms: [Windows, macOS, Linux]
category: security
openclaw skills install ai-supply-chain-security
# Clone repository
git clone https://github.com/javamagong/ai-supply-chain-security.git
# Run directly (no install script needed)
python ai-scanner.py --help
| AI Assistant | Config File | Detection Content |
|---|---|---|
| Claude Code | .claude/settings.json | hooks, MCP servers, permissions |
| Cursor | .cursorrules | Prompt injection |
| Generic | CLAUDE.md | Prompt injection attacks |
Scans MCP server configurations for:
Detects suspicious patterns in CLAUDE.md and .cursorrules:
npm Packages:
Python Packages:
Rust Crates:
package-lock.json / yarn.lock:
resolved URLs (CRITICAL)integrity hashes (WARNING)poetry.lock:
Cargo.lock:
.npmrc:
_authToken values (CRITICAL)always-auth=true credential exposurepip.conf / pip.ini:
index-url (CRITICAL)extra-index-url dependency confusion risk (WARNING)trusted-host TLS bypass (WARNING)# Scan current directory
python ai_scanner.py
# Scan specific directory
python ai_scanner.py -d /path/to/project
# Full scan with node_modules
python ai_scanner.py -d /path/to/project --full
# Scan all projects under directory
python auto_scanner.py -d /path/to/projects
# Scan with specific severity filter
python auto_scanner.py -d /path/to/projects --severity critical
# Text output (default)
python ai_scanner.py -f text
# JSON output
python ai_scanner.py -f json -o report.json
# Markdown report
python ai_scanner.py -f markdown -o report.md
Edit config.yaml:
scan_paths:
- "./"
- "../projects"
notification:
webhook:
enabled: false
url: "${SECURITY_WEBHOOK_URL}"
email:
enabled: false
smtp_host: "${SMTP_HOST}"
smtp_port: 587
from: "${SMTP_FROM}"
to: "${SMTP_TO}"
password: "${SMTP_PASSWORD}"
severity_threshold: "medium"
auto_fix: false
- name: Security Scan
uses: actions/checkout@v3
- name: Run AI Security Scanner
run: |
pip install -r requirements.txt
python ai_scanner.py -d . -f json -o security-report.json
- name: Upload Report
uses: actions/upload-artifact@v3
with:
name: security-report
path: security-report.json
repos:
- repo: local
hooks:
- id: ai-security-scan
name: AI Security Scanner
entry: python ai_scanner.py -d .
language: system
pass_filenames: false
requirements.txt for dependenciesMIT-0 - See LICENSE file
JavaMaGong - https://github.com/javamagong
See CHANGELOG.md for version history