feat: consolidate all Anthropic plugins into ECC v2.0.0

Ports functionality from 10+ separate plugins into ECC so users only
need one plugin installed. Consolidates: pr-review-toolkit, feature-dev,
commit-commands, hookify, code-simplifier, security-guidance,
frontend-design, explanatory-output-style, and personal skills.

New agents (8): code-architect, code-explorer, code-simplifier,
comment-analyzer, conversation-analyzer, pr-test-analyzer,
silent-failure-hunter, type-design-analyzer

New commands (9): commit, commit-push-pr, clean-gone, review-pr,
feature-dev, hookify, hookify-list, hookify-configure, hookify-help

New skills (8): frontend-design, hookify-rules, github-ops,
knowledge-ops, lead-intelligence, oura-health, pmx-guidelines, remotion

Enhanced skills (8): article-writing, content-engine, market-research,
investor-materials, investor-outreach, x-api, security-scan,
autonomous-loops — merged with personal skill content

New hook: security-reminder.py (pattern-based OWASP vulnerability
warnings on file edits)

Totals: 36 agents, 69 commands, 128 skills, 29 hook scripts
This commit is contained in:
Affaan Mustafa
2026-03-31 21:54:03 -07:00
parent 19755f6c52
commit 4813ed753f
73 changed files with 5618 additions and 27 deletions

View File

@@ -159,6 +159,63 @@ Add to your CI pipeline:
- Missing descriptions on MCP servers
- Prohibitive instructions correctly flagged as good practice
## Infrastructure Security Operations
Beyond Claude Code config scanning, this skill covers broader infrastructure security hygiene.
### Repository Security Checks
```bash
# Check Dependabot alerts across repos
gh api repos/{owner}/{repo}/dependabot/alerts --jq '.[].security_advisory.summary'
# Check for exposed secrets in recent commits
gh api repos/{owner}/{repo}/secret-scanning/alerts --jq '.[].state'
# Check code scanning alerts (CodeQL)
gh api repos/{owner}/{repo}/code-scanning/alerts --jq '.[].rule.description'
```
### API Key Hygiene
Track and rotate API keys on a schedule:
| Category | Rotation Frequency |
|----------|--------------------|
| LLM APIs (OpenAI, Anthropic, etc.) | Quarterly |
| Search APIs (Exa, Brave, Firecrawl) | Quarterly |
| Social APIs (X, LinkedIn) | On compromise only |
| Infrastructure (Supabase, GitHub tokens) | Quarterly |
| Payment (Stripe) | On compromise only |
| OAuth tokens (Oura, Google) | Auto-refresh |
### Quick Security Audit
1. Check all repos for Dependabot alerts
2. Check for exposed secrets in recent commits
3. Verify critical services are responding
4. Check SSL cert expiry for deployed domains
5. Review API key scopes (are any over-permissioned?)
### Deep Security Audit
1. Full dependency tree analysis for each repo
2. API key scope review
3. Review LaunchAgent/cron configurations for security implications
4. Check for hardcoded secrets in codebase (beyond .env)
5. Network exposure audit (what ports are open?)
6. Review OAuth token scopes and expiry
7. License compliance check
### Incident Response
If a key is compromised:
1. Immediately rotate the affected key
2. Check service logs for unauthorized usage
3. Review git history for when/how it was exposed
4. Update `.env` files across all systems
5. Assess impact and notify stakeholders
## Links
- **GitHub**: [github.com/affaan-m/agentshield](https://github.com/affaan-m/agentshield)