Claude Plugin

insecure-defaults

Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production

Editor's Note

Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production

Plugin Overview

This item is backed by a plugin manifest rather than a `SKILL.md` file, so the most useful fields are surfaced here first.

Plugin Name

insecure-defaults

Version

1.0.0

Author

Trail of Bits (opensource@trailofbits.com)

Manifest Description

Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production

Raw Manifest

The structured plugin fields above are derived from the same upstream manifest shown below.

{ "name": "insecure-defaults", "version": "1.0.0", "description": "Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production", "author": { "name": "Trail of Bits", "email": "opensource@trailofbits.com", "url": "https://github.com/trailofbits" } }

Related Items

Deploy agents, MCP servers, and backends fast logo

Railway - Deploy agents and MCP servers fast

Try Railway