SkillAgentSearch skills...

Perseus

AI-powered security assessment SKILLS for your codebase. Multi-language (JS, Go, Python, Rust, Java, PHP, Ruby, C#). Works with Claude Code, Codex, OpenCode, etc.

Install / Use

/learn @kaivyy/Perseus

README

Perseus Security Skills for Claude Code

Perseus Plugin

Perseus is a comprehensive suite of interactive security assessment skills for Claude Code. It transforms Claude into an autonomous penetration testing partner for your own codebase, capable of performing everything from initial reconnaissance to deep-dive vulnerability research and executive reporting.

Defensive Security Testing: Perseus analyzes your own code to find vulnerabilities before attackers do. This is equivalent to running a security linter or static analyzer.

Features

Multi-Language Support (8 Languages)

| Language | Frameworks | |----------|------------| | JavaScript/TypeScript | Express, Fastify, Next.js, Nest.js, Hono, Bun | | Go | Gin, Echo, Fiber, Chi | | PHP | Laravel, Symfony, Slim, Lumen | | Python | FastAPI, Django, Flask, Starlette | | Rust | Actix-web, Axum, Rocket, Warp | | Java | Spring Boot, Quarkus, Micronaut | | Ruby | Rails, Sinatra, Grape | | C# | ASP.NET Core, Minimal APIs |

Smart Auto-Detection

Perseus automatically detects your project's:

  • Language & Framework (Next.js, Django, Spring, etc.)
  • Database (PostgreSQL, MongoDB, Redis, etc.)
  • Infrastructure (Docker, Kubernetes, AWS/GCP/Azure)
  • CI/CD (GitHub Actions, GitLab CI, Jenkins)
  • AI/LLM (OpenAI, Anthropic, LangChain)

Extended Coverage

  • API Security: REST, GraphQL, WebSocket, gRPC, OAuth, Cache poisoning
  • Injection: SQL, NoSQL, Command, SSTI, LDAP, XPath, Log4j
  • Infrastructure: Docker, CI/CD, Cloud (AWS/GCP/Azure), Kubernetes
  • AI Security: Prompt injection, RAG security, tool use validation
  • Client-Side: React, Next.js SSR, Vue, Angular, Server Actions

Installation

Claude Code

/plugin install https://github.com/kaivyy/perseus

That's it! Everything is automatic:

  • Skills and commands auto-discovered
  • Hooks auto-registered
  • Context injected on session start

Codex

git clone https://github.com/kaivyy/perseus.git ~/.codex/perseus
mkdir -p ~/.agents/skills
ln -sf ~/.codex/perseus/skills ~/.agents/skills/perseus

OpenCode

git clone https://github.com/kaivyy/perseus.git ~/.config/opencode/perseus && \
  mkdir -p ~/.config/opencode/plugins ~/.config/opencode/skills && \
  ln -sf ~/.config/opencode/perseus/.opencode/plugins/perseus.js ~/.config/opencode/plugins/perseus.js && \
  ln -sf ~/.config/opencode/perseus/skills ~/.config/opencode/skills/perseus

Uninstall

/plugin uninstall perseus

Quick Start

# Full automated assessment (with smart auto-detect)
/start

# Or run key steps manually
/scan        # Phase 1: Reconnaissance
/report      # Phase 4: Executive Report

# Optional: run all specialists
/specialist

Engagement Modes

Perseus uses explicit verification modes during assessment:

| Mode | Environment | Verification Style | |------|-------------|--------------------| | PRODUCTION_SAFE | Live production | Passive-first checks + minimal non-disruptive validation | | STAGING_ACTIVE | Staging/pre-production | Active verification with strict throttling | | LAB_FULL | Isolated lab | Broad dynamic verification | | LAB_RED_TEAM | Dedicated security lab | Controlled adversarial chain simulation with kill-switches |

Default mode is PRODUCTION_SAFE when environment is unclear.


Core Assessment Phases

Perseus follows a structured 4-phase methodology:

Phase 1: Scan (Reconnaissance)

Maps architecture, entry points, dependencies, and attack surface.

| Command | Agents | Output | |---------|--------|--------| | /scan | 13 parallel agents | deliverables/code_analysis_deliverable.md |

Coverage:

  • Architecture & Tech Stack (auto-detect 8 languages)
  • Entry Points (API, GraphQL, WebSocket, gRPC)
  • Dependencies & CVEs
  • Hardcoded Secrets
  • Security Patterns (Auth, Authz)
  • Injection Sinks & XSS Sinks
  • SSRF & Data Flows
  • Crypto Usage
  • Security Headers & Config

Phase 2: Audit (Vulnerability Analysis)

Deep white-box analysis using Negative Analysis Loop (Source → Flow → Sink → Defense → Verdict).

Runs automatically after Scan during /start.

Wave 1: SQL Injection, Command Injection, XSS, Auth, Authz Wave 2: SSRF, Template Injection, Deserialization, Path Traversal, XXE Wave 3: JWT, Crypto, Race Conditions, Business Logic

Phase 3: Exploit (Verification)

Verify findings with mode-aware safe Proof-of-Concept payloads.

Runs automatically after Audit during /start.

Safe Payloads Only:

  • SQL: SLEEP(5), AND 1=1
  • Command: sleep 5, whoami
  • XSS: alert(1), alert(document.domain)
  • SSTI: {{7*7}}49

Phase 4: Report (Executive Summary)

Synthesize all findings into professional security report.

| Command | Output | |---------|--------| | /report | deliverables/SECURITY_REPORT.md |

Report Includes:

  • Executive Summary & Risk Overview
  • Engagement mode and verification coverage
  • Technologies Analyzed (language, framework, infrastructure)
  • Verified Exploits with PoC
  • Infrastructure Security (Docker, CI/CD, Cloud, K8s)
  • AI/LLM Security Findings
  • Supply Chain Summary
  • Language-specific Remediation Guidance
  • Strategic Recommendations

Specialist Deep-Dive Skills

Perseus provides 8 enhanced specialist skills with multi-language support. These run automatically during /start when relevant signals are detected. Use /specialist to force-run all of them.

| Skill | Coverage | |-------|----------| | api | OWASP API Top 10, GraphQL, WebSocket, OAuth, Cache, gRPC | | injection | NoSQL, LDAP, XPath, SSTI, Command, Log4j, Expression Language | | crypto | JWT (8 languages), Hashing, Encryption, Key Management | | supply-chain | CVEs (8 package managers), Typosquatting, Dependency Confusion | | file | Path Traversal, Upload Bypass, XXE, Zip Slip (8 languages) | | logic | Business Logic, Race Conditions, AI/LLM Security, Price Manipulation | | client | React, Next.js SSR, Server Actions, Vue, Angular, Svelte | | config | Docker, CI/CD, Cloud (AWS/GCP/Azure), Kubernetes |


Command Reference

Short Commands (Aliases)

| Command | Description | |---------|-------------| | /start | Full automated assessment with smart auto-detect | | /scan | Phase 1: Reconnaissance | | /report | Phase 4: Executive Report |

Specialist Command

| Command | Description | |---------|-------------| | /specialist | Run all specialist skills |

Full Commands

| Command | Description | |---------|-------------| | /perseus:start | Full automated assessment | | /perseus:scan | Reconnaissance | | /perseus:report | Executive Report |

Full Specialist Command

| Command | Description | |---------|-------------| | /perseus:specialist | Run all specialist skills |


Output Structure

After a full assessment, the deliverables/ directory contains:

deliverables/
├── engagement_profile.md          # Mode, scope, limits, kill-switch thresholds
├── code_analysis_deliverable.md    # Scan results (multi-language)
├── sql_injection_analysis.md       # Audit reports
├── command_injection_analysis.md
├── xss_analysis.md
├── auth_analysis.md
├── authz_analysis.md
├── ssrf_analysis.md
├── template_injection_analysis.md
├── deserialization_analysis.md
├── path_traversal_analysis.md
├── xxe_analysis.md
├── jwt_analysis.md
├── crypto_analysis.md
├── race_condition_analysis.md
├── business_logic_analysis.md
├── api_security_analysis.md        # Specialist reports
├── injection_deep_analysis.md
├── crypto_security_analysis.md
├── supply_chain_analysis.md
├── file_security_analysis.md
├── client_side_analysis.md
├── config_security_analysis.md     # Includes Docker/CI/K8s
├── verification_scope.md           # Verification boundaries and approved test window
├── exploitation_report.md          # Verified exploits
└── SECURITY_REPORT.md              # Final executive report

Project Structure

perseus/
├── commands/                    # Command definitions
│   ├── scan.md                  # Short aliases
│   ├── report.md
│   ├── start.md
│   ├── specialist.md
│   ├── perseus-scan.md          # Full commands
│   ├── perseus-report.md
│   ├── perseus-start.md
│   └── perseus-specialist.md
├── skills/
│   └── perseus/
│       ├── scan/SKILL.md        # Core skills
│       ├── audit/SKILL.md
│       ├── exploit/SKILL.md
│       ├── report/SKILL.md
│       ├── start/SKILL.md
│       ├── using-perseus/SKILL.md
│       └── specialists/         # Specialist skills
│           ├── api/SKILL.md
│           ├── injection/SKILL.md
│           ├── crypto/SKILL.md
│           ├── supply-chain/SKILL.md
│           ├── file-security/SKILL.md
│           ├── logic/SKILL.md
│           ├── client/SKILL.md
│           ├── config/SKILL.md
│           └── all/SKILL.md
├── scripts/
│   ├── post-install.sh          # Auto symlink + hook patch
│   └── uninstall.sh
├── hooks/
│   ├── hooks.json
│   └── session-start.sh
├── tests/
│   ├── README.md
│   ├── run-tests.sh
│   └── validate-structure.cjs
├── LICENSE
└── README.md

Running Tests

./tests/run-tests.sh

Validates:

  • Metadata files (plugin.json, manifest.json)
  • Core skills (6 skills)
  • Specialist skills (9 skills)
  • Short commands (4 commands)
  • Perseus commands (4 commands)

Safety & Ethics

Perseus is designed for defensive security testing only:

  • All analysis is performed on your own codebase
  • Safe payloads only (no destructive operations)
  • PRODUCTION_SAFE is the default mode
  • Aggressive simulation is restricted to staging/lab modes
  • LAB_RED_TEAM requires isolated environment and non-production data
  • Kill-switch can stop active tests with ABORTED-SAFETY
  • No data exfiltration
  • Evidence-based reporting (no hallucinations)
  • Equivalent to running security linters or SAST tools

Troubleshooting

Hook Blocking Issue

Problem: Perseus scan/start fails with error like:

Error: PreToolU
View on GitHub
GitHub Stars64
CategoryDevelopment
Updated2d ago
Forks11

Languages

Shell

Security Score

100/100

Audited on Mar 30, 2026

No findings