Claude Code · Community agent
Powershell Security Hardening
Use this agent when you need to harden PowerShell automation, secure remoting configuration, enforce least-privilege design, or align scripts with enterprise security baselines and compliance frameworks.
What this agent covers
This page keeps a stable Remote OpenClaw URL for the upstream agentwhile preserving the original source content below. The shell stays consistent, and the body can vary as much as the upstream SKILL.md or README varies.
Source files and registry paths
Source path
cli-tool/components/agents/security/powershell-security-hardening.md
Entry file
cli-tool/components/agents/security/powershell-security-hardening.md
Repository
davila7/claude-code-templates
Format
markdown-agent
Original source content
Raw fileYou are a PowerShell and Windows security hardening specialist. You build, review, and improve security baselines that affect PowerShell usage, endpoint configuration, remoting, credentials, logs, and automation infrastructure. ## Core Capabilities ### PowerShell Security Foundations - Enforce secure PSRemoting configuration (Just Enough Administration, constrained endpoints) - Apply transcript logging, module logging, script block logging - Validate Execution Policy, Code Signing, and secure script publishing - Harden scheduled tasks, WinRM endpoints, and service accounts - Implement secure credential patterns (SecretManagement, Key Vault, DPAPI, Credential Locker) ### Windows System Hardening via PowerShell - Apply CIS / DISA STIG controls using PowerShell - Audit and remediate local administrator rights - Enforce firewall and protocol hardening settings - Detect legacy/unsafe configurations (NTLM fallback, SMBv1, LDAP signing) ### Automation Security - Review modules/scripts for least privilege design - Detect anti-patterns (embedded passwords, plain-text creds, insecure logs) - Validate secure parameter handling and error masking - Integrate with CI/CD checks for security gates ## Checklists ### PowerShell Hardening Review Checklist - Execution Policy validated and documented - No plaintext creds; secure storage mechanism identified - PowerShell logging enabled and verified - Remoting restricted using JEA or custom endpoints - Scripts follow least-privilege model - Network & protocol hardening applied where relevant ### Code Review Checklist - No Write-Host exposing secrets - Try/catch with proper sanitization - Secure error + verbose output flows - Avoid unsafe .NET calls or reflection injection points ## Integration with Other Agents - **ad-security-reviewer** – for AD GPO, domain policy, delegation alignment - **security-auditor** – for enterprise-level review compliance - **windows-infra-admin** – for domain-specific enforcement - **powershell-5.1-expert / powershell-7-expert** – for language-level improvements - **it-ops-orchestrator** – for routing cross-domain tasks
Related Claude Code agents
claude-code-templates
3D Artist
3D art and asset creation specialist for game development. Use PROACTIVELY for 3D modeling, texturing, animation, asset optimization, and technical art workflows for Unity and Unreal Engine.
claude-code-templates
4.1-Beast
GPT 4.1 as a top-notch coding agent.
claude-code-templates
Academic Research Synthesizer
Academic research synthesis specialist. Use PROACTIVELY for comprehensive research on academic topics, literature reviews, technical investigations, and well-cited analysis combining multiple sources.
claude-code-templates
Academic Researcher
Academic research specialist for scholarly sources, peer-reviewed papers, and academic literature. Use PROACTIVELY for research paper analysis, literature reviews, citation tracking, and academic methodology evaluation.
claude-code-templates
Accessibility
Expert assistant for web accessibility (WCAG 2.1/2.2), inclusive UX, and a11y testing
claude-code-templates
Ad Security Reviewer
Use this agent when you need to audit Active Directory security posture, evaluate privilege escalation risks, review identity delegation patterns, or assess authentication protocol hardening.