DeepSafe Scan
Preflight security scanner for AI coding agents. Detects hooks injection, credential exfiltration, and backdoors in .cursorrules, CLAUDE.md, and agent configs — before they compromise your environment.
Get a comprehensive security report for any AI coding agent project in under two minutes.
One command via ClaWHub or clone from GitHub. Zero dependencies — pure Python stdlib.
clawhub install deepsafe-scan
Point the scanner at any directory. Choose which modules to run, output format, and whether to use LLM analysis.
python3 scripts/scan.py --modules hooks --scan-dir . --no-llm --format markdown
Get an interactive HTML report with severity breakdown, per-finding remediation guidance, and a risk score.
→ Interactive report with severity gauges
Every scan covers posture, skills, memory, hooks injection, and model safety for complete situational awareness.
12 injection patterns across AI agent config files: .cursorrules, CLAUDE.md, .claude/settings.local.json, AGENTS.md, and more. Catches the attacks that actually compromise developer machines.
Config security analysis: openclaw.json, .env files, gateway exposure, authentication, and TLS configuration.
15+ static analyzers plus LLM semantic audit. Detects prompt injection, encoded payloads, embedded secrets, and data exfiltration chains.
27+ secret patterns, 9 PII type detectors, injection persistence scanning, and session leak analysis across conversation history.
4 specialized behavioral probes evaluate the configured model for manipulation, concealment, deception, and hallucination tendencies.
Auto-detects your environment and API credentials. Install once, scan everywhere.
Full native support. Auto-reads gateway config and OpenClaw settings.
Auto-detects ANTHROPIC_API_KEY. Scans .claude/settings.json hooks.
Scans .cursorrules injection. Static analysis works without API key.
Auto-detects OPENAI_API_KEY. Scans AGENTS.md for injection patterns.
Real regex patterns, behavioral probes, and static analyzers running on your machine. Not marketing fluff.
Watch the hooks scanner detect real-world injection patterns hiding in AI agent config files.
No cloud accounts, no config files, no waiting. Just the security insights you need.
Pure Python stdlib. No pip install needed. Just clone and run.
One scanner for OpenClaw, Claude Code, Cursor, and Codex.
12 injection patterns catch reverse shells, RCE, and credential theft.
Finds your LLM credentials automatically. Install and run.
Beautiful interactive reports with severity gauges and remediation.
Configurable TTL so repeat scans are near-instant.