{ "name": "insecure-defaults", "version": "1.0.0", "description": "Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production", "author": { "name": "Trail of Bits", "email": "opensource@trailofbits.com", "url": "https://github.com/trailofbits" } }
Claude Plugin
insecure-defaults
Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production
Editor's Note
Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production
Plugin Overview
This item is backed by a plugin manifest rather than a `SKILL.md` file, so the most useful fields are surfaced here first.
Plugin Name
insecure-defaults
Version
1.0.0
Author
Trail of Bits (opensource@trailofbits.com)
Manifest Description
Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production
Raw Manifest
The structured plugin fields above are derived from the same upstream manifest shown below.
Related Items
Claude Plugin
agentic-actions-auditor
Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations (Claude Code Action, Gemini CLI, OpenAI Codex, GitHub AI Inference)
Claude Plugin
ask-questions-if-underspecified
Clarify ambiguous requirements by asking questions before implementing. Only when invoked explicitly.
Claude Plugin
audit-context-building
Build deep architectural context through ultra-granular code analysis before vulnerability hunting
Claude Plugin
azure
Microsoft Azure MCP and Skills integration for cloud resource management, deployments, and Azure services. Manage your Azure infrastructure, monitor applications, and deploy resources directly from Claude Code.