Advanced security review agent for Claude Code that combines static code analysis with real-time CVE checking.
- Real-time CVE Detection via Perplexity MCP with accurate date searches
- Latest Library Versions via Context7 MCP documentation
- Smart Git Handling - works in git repos, fresh repos, and non-git directories
- Comprehensive Static Analysis - SQL injection, XSS, RCE, auth bypass, etc.
- False Positive Filtering - 18 hard exclusions + 12 precedents from Anthropic's official template
- Framework-Specific Checks - Next.js, React, Node.js, Python
Simply tell Claude Code:
Install WaiSecurity Agent from https://github.com/mikwiseman/wai-security
To update to the latest version, tell Claude Code:
Update WaiSecurity: download https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md and replace ~/.claude/commands/security-review.md
Or one-liner in terminal:
curl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md -o ~/.claude/commands/security-review.mdClick to expand instructions for Claude Code
If you are Claude Code reading this, follow these steps to install WaiSecurity Agent:
- Create the commands directory if it doesn't exist:
mkdir -p ~/.claude/commands- Download the security-review.md command:
curl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md -o ~/.claude/commands/security-review.md- Verify installation:
ls -la ~/.claude/commands/security-review.md- Inform the user that installation is complete and they can now use
/security-reviewin any project.
Alternative method (if curl fails):
- Use WebFetch to get the raw content from:
https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md - Write the content to
~/.claude/commands/security-review.md
# Clone the repository
git clone https://github.com/mikwiseman/wai-security.git
# Copy command to your Claude Code commands directory
cp wai-security/.claude/commands/security-review.md ~/.claude/commands/curl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/.claude/commands/security-review.md -o ~/.claude/commands/security-review.mdcurl -fsSL https://raw.githubusercontent.com/mikwiseman/wai-security/main/install.sh | bashIn any project directory, run:
/security-review
The agent will automatically:
- Get system date for accurate CVE searches
- Detect environment (git repo, fresh repo, or non-git)
- Check dependencies via Context7 + Perplexity MCPs
- Analyze code for security vulnerabilities
- Filter false positives and generate report
┌─────────────────────────────────────────────────────┐
│ WaiSecurity Agent v1.0 │
├─────────────────────────────────────────────────────┤
│ PHASE 0: Pre-flight Checks │
│ • date "+%Y-%m-%d %B %Y" │
│ • git rev-parse (is git repo?) │
│ • origin/HEAD check (has remote?) │
├─────────────────────────────────────────────────────┤
│ PHASE 1: Dependency CVE Check │
│ • Context7 MCP → latest stable versions │
│ • Perplexity MCP → "{pkg} CVE {month} {year}" │
│ • Stable vs beta/rc/canary verification │
├─────────────────────────────────────────────────────┤
│ PHASE 2: Static Code Analysis │
│ • Automatic file discovery based on environment │
│ • git diff / git ls-files / find fallback │
├─────────────────────────────────────────────────────┤
│ PHASE 3: Vulnerability Analysis │
│ • Input validation (SQL, XSS, command injection) │
│ • Auth & authorization issues │
│ • Crypto & secrets management │
│ • Framework-specific (Next.js, React, Python) │
├─────────────────────────────────────────────────────┤
│ PHASE 4: False Positive Filtering │
│ • Confidence scoring (>80% required) │
│ • 18 hard exclusions │
│ • Parallel sub-task verification │
└─────────────────────────────────────────────────────┘
- Claude Code CLI
- MCP servers (optional but recommended):
- Context7 MCP - for library documentation
- Perplexity MCP - for real-time CVE searches
# Security Audit Report
**Date**: January 27, 2026
**Project**: my-app
## Executive Summary
- Critical: 1 | High: 2 | Medium: 0 | Low: 0
## Dependency Vulnerabilities
| Package | Installed | Latest Stable | Status | CVEs Found |
|---------|-----------|---------------|--------|------------|
| lodash | 4.17.20 | 4.17.21 | OUTDATED | CVE-2021-23337 |
## Code Vulnerabilities
### [CRITICAL-001] SQL Injection
**File**: `src/api/users.ts:42`
**Severity**: Critical
**Confidence**: 9/10
**Description**: User input directly interpolated into SQL query...| Feature | Official | WaiSecurity |
|---|---|---|
| Static code analysis | ✅ | ✅ |
| False positive filtering | ✅ | ✅ |
| System date check | ❌ | ✅ |
| Context7 MCP integration | ❌ | ✅ |
| Perplexity MCP for CVEs | ❌ | ✅ |
| Git pre-flight checks | ❌ | ✅ |
| Non-git directory support | ❌ | ✅ |
| Fresh repo support | ❌ | ✅ |
| Stable vs beta check | ❌ | ✅ |
MIT License - Copyright (c) 2026 WaiWai, LLC
Created by WaiWai, LLC
[WaiSecurity Agent v1.0] - Comprehensive security reviews for Claude Code
Made with ❤️ by WaiWai