commit 6878424171875829ace9ef2bece23675d07f356b Author: Zhongwei Li Date: Sun Nov 30 08:21:52 2025 +0800 Initial commit diff --git a/.claude-plugin/plugin.json b/.claude-plugin/plugin.json new file mode 100644 index 0000000..5a8bb6b --- /dev/null +++ b/.claude-plugin/plugin.json @@ -0,0 +1,15 @@ +{ + "name": "access-control-auditor", + "description": "Audit access control implementations", + "version": "1.0.0", + "author": { + "name": "Jeremy Longshore", + "email": "[email protected]" + }, + "skills": [ + "./skills" + ], + "commands": [ + "./commands" + ] +} \ No newline at end of file diff --git a/README.md b/README.md new file mode 100644 index 0000000..a037089 --- /dev/null +++ b/README.md @@ -0,0 +1,3 @@ +# access-control-auditor + +Audit access control implementations diff --git a/commands/audit-access.md b/commands/audit-access.md new file mode 100644 index 0000000..205880e --- /dev/null +++ b/commands/audit-access.md @@ -0,0 +1,8 @@ +--- +description: DESCRIPTION_PLACEHOLDER +shortcut: SHORTCUT_PLACEHOLDER +--- + +# TITLE_PLACEHOLDER + +CONTENT_PLACEHOLDER diff --git a/plugin.lock.json b/plugin.lock.json new file mode 100644 index 0000000..38f52b2 --- /dev/null +++ b/plugin.lock.json @@ -0,0 +1,61 @@ +{ + "$schema": "internal://schemas/plugin.lock.v1.json", + "pluginId": "gh:jeremylongshore/claude-code-plugins-plus:plugins/security/access-control-auditor", + "normalized": { + "repo": null, + "ref": "refs/tags/v20251128.0", + "commit": "5f2e4a4d5cb450b7a9b7426fa2374e755793624f", + "treeHash": "e91aa6952b46e3f2b95ca8c4d889be0bd6b78aba3a8d3d9190755155286fbd2a", + "generatedAt": "2025-11-28T10:18:02.489243Z", + "toolVersion": "publish_plugins.py@0.2.0" + }, + "origin": { + "remote": "git@github.com:zhongweili/42plugin-data.git", + "branch": "master", + "commit": "aa1497ed0949fd50e99e70d6324a29c5b34f9390", + "repoRoot": "/Users/zhongweili/projects/openmind/42plugin-data" + }, + "manifest": { + "name": "access-control-auditor", + "description": "Audit access control implementations", + "version": "1.0.0" + }, + "content": { + "files": [ + { + "path": "README.md", + "sha256": "95d73568a30fee2228d3f5abc7aa292807079b09edbd1b7ea52f21114a497161" + }, + { + "path": ".claude-plugin/plugin.json", + "sha256": "12b281317c20490aba9c666a10fc571cd82baadde25af3d25574cba62d99b6fa" + }, + { + "path": "commands/audit-access.md", + "sha256": "26981dafecd0bda9d89082c091325c9fdc3ac197318243e952dde0b1a38f4088" + }, + { + "path": "skills/access-control-auditor/SKILL.md", + "sha256": "07f2a1b051c15fe041db6911bc3741cefe94457a41c3840966a5f50c5386969e" + }, + { + "path": "skills/access-control-auditor/references/README.md", + "sha256": "e92a7c1b5f72cfe8582aa16968ce4ac9c9aa1c1697a24e84d259e7907600dd39" + }, + { + "path": "skills/access-control-auditor/scripts/README.md", + "sha256": "97f5be07b156597699c0ddd41b5e3248159b57db9d23b4d7f9bdc5d6428296ae" + }, + { + "path": "skills/access-control-auditor/assets/README.md", + "sha256": "7b82e0b3aa66ff1fb77e36edae6337cc6e1a86ba38eb4450daf5589ddebc84b0" + } + ], + "dirSha256": "e91aa6952b46e3f2b95ca8c4d889be0bd6b78aba3a8d3d9190755155286fbd2a" + }, + "security": { + "scannedAt": null, + "scannerVersion": null, + "flags": [] + } +} \ No newline at end of file diff --git a/skills/access-control-auditor/SKILL.md b/skills/access-control-auditor/SKILL.md new file mode 100644 index 0000000..151d210 --- /dev/null +++ b/skills/access-control-auditor/SKILL.md @@ -0,0 +1,55 @@ +--- +name: auditing-access-control +description: | + This skill enables Claude to audit access control implementations in various systems. It uses the access-control-auditor plugin to identify potential vulnerabilities and misconfigurations related to access control. Use this skill when the user asks to "audit access control", "check permissions", "assess access rights", or requests a "security review" focused on access management. It's particularly useful for analyzing IAM policies, ACLs, and other access control mechanisms in cloud environments, applications, or infrastructure. The skill helps ensure compliance with security best practices and identify potential privilege escalation paths. +allowed-tools: Read, Write, Edit, Grep, Glob, Bash +version: 1.0.0 +--- + +## Overview + +This skill leverages the access-control-auditor plugin to perform comprehensive audits of access control configurations. It helps identify potential security risks associated with overly permissive access, misconfigured permissions, and non-compliance with security policies. + +## How It Works + +1. **Analyze Request**: Claude identifies the user's intent to audit access control. +2. **Invoke Plugin**: The access-control-auditor plugin is activated. +3. **Execute Audit**: The plugin analyzes the specified access control configuration (e.g., IAM policies, ACLs). +4. **Report Findings**: The plugin generates a report highlighting potential vulnerabilities and misconfigurations. + +## When to Use This Skill + +This skill activates when you need to: +- Audit IAM policies in a cloud environment. +- Review access control lists (ACLs) for network resources. +- Assess user permissions in an application. +- Identify potential privilege escalation paths. +- Ensure compliance with access control security policies. + +## Examples + +### Example 1: Auditing AWS IAM Policies + +User request: "Audit the AWS IAM policies in my account for overly permissive access." + +The skill will: +1. Invoke the access-control-auditor plugin, specifying the AWS account and IAM policies as the target. +2. Generate a report identifying IAM policies that grant overly broad permissions or violate security best practices. + +### Example 2: Reviewing Network ACLs + +User request: "Review the network ACLs for my VPC to identify any potential security vulnerabilities." + +The skill will: +1. Activate the access-control-auditor plugin, specifying the VPC and network ACLs as the target. +2. Produce a report highlighting ACL rules that allow unauthorized access or expose the VPC to unnecessary risks. + +## Best Practices + +- **Scope Definition**: Clearly define the scope of the audit (e.g., specific IAM roles, network segments, applications). +- **Contextual Information**: Provide contextual information about the environment being audited (e.g., security policies, compliance requirements). +- **Remediation Guidance**: Use the audit findings to develop and implement remediation strategies to address identified vulnerabilities. + +## Integration + +This skill can be integrated with other security plugins to provide a more comprehensive security assessment. For example, it can be combined with a vulnerability scanner to identify vulnerabilities that could be exploited due to access control misconfigurations. It can also be integrated with compliance tools to ensure adherence to regulatory requirements. \ No newline at end of file diff --git a/skills/access-control-auditor/assets/README.md b/skills/access-control-auditor/assets/README.md new file mode 100644 index 0000000..3f24b0a --- /dev/null +++ b/skills/access-control-auditor/assets/README.md @@ -0,0 +1,7 @@ +# Assets + +Bundled resources for access-control-auditor skill + +- [ ] report_template.docx: A template for generating access control audit reports, including sections for findings, recommendations, and severity levels. +- [ ] example_iam_policy.json: Example IAM policy demonstrating common misconfigurations and vulnerabilities. +- [ ] example_acl.txt: Example ACL configuration file with potential security issues. diff --git a/skills/access-control-auditor/references/README.md b/skills/access-control-auditor/references/README.md new file mode 100644 index 0000000..03a7e8c --- /dev/null +++ b/skills/access-control-auditor/references/README.md @@ -0,0 +1,7 @@ +# References + +Bundled resources for access-control-auditor skill + +- [ ] iam_policy_best_practices.md: Documentation outlining best practices for IAM policy configuration, including least privilege principles and separation of duties. +- [ ] acl_vulnerabilities.md: A comprehensive list of common ACL vulnerabilities and misconfigurations, along with mitigation strategies. +- [ ] access_control_standards.md: Reference document detailing industry standards and compliance requirements for access control (e.g., NIST, GDPR). diff --git a/skills/access-control-auditor/scripts/README.md b/skills/access-control-auditor/scripts/README.md new file mode 100644 index 0000000..c93ca2c --- /dev/null +++ b/skills/access-control-auditor/scripts/README.md @@ -0,0 +1,7 @@ +# Scripts + +Bundled resources for access-control-auditor skill + +- [ ] access_control_audit.py: Script to automate the access control auditing process, taking system configuration files as input and generating a report of potential vulnerabilities. +- [ ] policy_parser.py: Script to parse IAM policies and ACLs, extracting relevant access control rules for analysis. +- [ ] report_generator.py: Script to generate a formatted report of access control audit findings, including severity levels and remediation recommendations.