Skip to content

mikwiseman/wai-security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WaiSecurity Agent

Advanced security review agent for Claude Code that combines static code analysis with real-time CVE checking.

Features

  • Real-time CVE Detection via Perplexity MCP with accurate date searches
  • Latest Library Versions via Context7 MCP documentation
  • Smart Git Handling - works in git repos, fresh repos, and non-git directories
  • Comprehensive Static Analysis - SQL injection, XSS, RCE, auth bypass, etc.
  • False Positive Filtering - 18 hard exclusions + 12 precedents from Anthropic's official template
  • Framework-Specific Checks - Next.js, React, Node.js, Python

Installation

For Claude Code (Copy & Paste)

Simply tell Claude Code:

Install WaiSecurity Agent from https://github.com/mikwiseman/wai-security

Update

To update to the latest version, tell Claude Code:

Update WaiSecurity: download https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md and replace ~/.claude/commands/security-review.md

Or one-liner in terminal:

curl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md -o ~/.claude/commands/security-review.md

Claude Code Installation Instructions

Click to expand instructions for Claude Code

If you are Claude Code reading this, follow these steps to install WaiSecurity Agent:

  1. Create the commands directory if it doesn't exist:
mkdir -p ~/.claude/commands
  1. Download the security-review.md command:
curl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md -o ~/.claude/commands/security-review.md
  1. Verify installation:
ls -la ~/.claude/commands/security-review.md
  1. Inform the user that installation is complete and they can now use /security-review in any project.

Alternative method (if curl fails):

  • Use WebFetch to get the raw content from: https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md
  • Write the content to ~/.claude/commands/security-review.md

Manual Install (Terminal)

# Clone the repository
git clone https://github.com/mikwiseman/wai-security.git

# Copy command to your Claude Code commands directory
cp wai-security/.claude/commands/security-review.md ~/.claude/commands/

One-liner Install

curl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md -o ~/.claude/commands/security-review.md

Install Script

curl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/install.sh | bash

Usage

In any project directory, run:

/security-review

The agent will automatically:

  1. Get system date for accurate CVE searches
  2. Detect environment (git repo, fresh repo, or non-git)
  3. Check dependencies via Context7 + Perplexity MCPs
  4. Analyze code for security vulnerabilities
  5. Filter false positives and generate report

How It Works

┌─────────────────────────────────────────────────────┐
│            WaiSecurity Agent v1.0                   │
├─────────────────────────────────────────────────────┤
│ PHASE 0: Pre-flight Checks                          │
│   • date "+%Y-%m-%d %B %Y"                         │
│   • git rev-parse (is git repo?)                   │
│   • origin/HEAD check (has remote?)               │
├─────────────────────────────────────────────────────┤
│ PHASE 1: Dependency CVE Check                       │
│   • Context7 MCP → latest stable versions          │
│   • Perplexity MCP → "{pkg} CVE {month} {year}"   │
│   • Stable vs beta/rc/canary verification          │
├─────────────────────────────────────────────────────┤
│ PHASE 2: Static Code Analysis                       │
│   • Automatic file discovery based on environment  │
│   • git diff / git ls-files / find fallback        │
├─────────────────────────────────────────────────────┤
│ PHASE 3: Vulnerability Analysis                     │
│   • Input validation (SQL, XSS, command injection) │
│   • Auth & authorization issues                    │
│   • Crypto & secrets management                    │
│   • Framework-specific (Next.js, React, Python)    │
├─────────────────────────────────────────────────────┤
│ PHASE 4: False Positive Filtering                   │
│   • Confidence scoring (>80% required)             │
│   • 18 hard exclusions                             │
│   • Parallel sub-task verification                 │
└─────────────────────────────────────────────────────┘

Requirements

  • Claude Code CLI
  • MCP servers (optional but recommended):
    • Context7 MCP - for library documentation
    • Perplexity MCP - for real-time CVE searches

Output Example

# Security Audit Report

**Date**: January 27, 2026
**Project**: my-app

## Executive Summary
- Critical: 1 | High: 2 | Medium: 0 | Low: 0

## Dependency Vulnerabilities

| Package | Installed | Latest Stable | Status | CVEs Found |
|---------|-----------|---------------|--------|------------|
| lodash  | 4.17.20   | 4.17.21       | OUTDATED | CVE-2021-23337 |

## Code Vulnerabilities

### [CRITICAL-001] SQL Injection
**File**: `src/api/users.ts:42`
**Severity**: Critical
**Confidence**: 9/10

**Description**: User input directly interpolated into SQL query...

Comparison with Official /security-review

Feature Official WaiSecurity
Static code analysis
False positive filtering
System date check
Context7 MCP integration
Perplexity MCP for CVEs
Git pre-flight checks
Non-git directory support
Fresh repo support
Stable vs beta check

License

MIT License - Copyright (c) 2026 WaiWai, LLC

Author

Created by WaiWai, LLC


[WaiSecurity Agent v1.0] - Comprehensive security reviews for Claude Code

Made with ❤️ by WaiWai

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages