Claude Code Tools

cyber-neo

github

Open-source cybersecurity analysis agent for Claude Code. Scans projects for vulnerabilities across all OWASP 2025 Top 10 and CWE Top 25 categories. 11 security domains, 60+ secret patterns, parallel subagent analysis, professional report generation. Built by tododeia.com

Stars
⭐ 97
License
MIT
Last Updated
2026-05-18
Source
github

CYBER NEO

The Open-Source Cybersecurity Agent for Claude Code

Protect your apps. Protect your users. Protect your community.

License: MIT OWASP 2025 CWE Top 25 Claude Code Community Instagram


Shipped by @soyenriquerocha | Built by the Tododeia community — empowering developers to ship secure software.


What is Cyber Neo?

Cyber Neo is a comprehensive cybersecurity analysis agent that runs inside Claude Code. Point it at any project on your computer, and it performs a deep security audit — scanning your code, dependencies, secrets, infrastructure, and supply chain for vulnerabilities. It generates a professional, prioritized report with actionable remediation guidance so you can fix issues before they become incidents.

No security expertise required. Just run /cyber-neo and let the agent do the work.

Cyber Neo was built with a mission: our community at tododeia.com is building apps, tools, and products. We want to help every developer in the community protect what they’re building. This agent is our contribution — open source, free, and designed to be the most thorough security scanner available as a Claude Code skill.


Why Cyber Neo?

Most security tools require installation, configuration, and expertise to interpret results. Cyber Neo is different:

Traditional Security ToolsCyber Neo
Require installation and setupWorks instantly as a Claude Code skill
Need security expertise to interpretPlain-language findings with code-level remediation
Scan one category (SAST or SCA or secrets)Scans 11 categories in one run
Output raw findings without contextCWE/OWASP-classified findings with fix examples
Run sequentially5 parallel subagents for speed
Require paid licenses for full coverage100% free and open source

What It Scans

Cyber Neo covers 11 security domains across every major vulnerability class:

#CategoryWhat It FindsHow
1Code Security (SAST)SQL injection, XSS, command injection, code injection, path traversal, SSRF, deserialization, prototype pollutionSemgrep (optional) + Claude-native pattern analysis
2Authentication & AuthorizationMissing auth middleware, JWT misconfigurations, broken access control, IDOR, session management flaws, missing RBACClaude-native analysis using auth-authz-patterns.md
3Cryptographic SecurityWeak algorithms (MD5, SHA1, DES, RC4), hardcoded keys/IVs, TLS bypass, insecure random, weak key lengthsClaude-native analysis using crypto-patterns.md
4Secret Detection60+ regex patterns: AWS, GCP, Azure, GitHub, Slack, Stripe, database credentials, private keys, API keys, JWT tokens, .env filesPython batch scanner + Gitleaks (optional)
5Dependency Vulnerabilities (SCA)Known CVEs in npm, pip, cargo, bundler, composer, and Go dependenciesTrivy / npm audit / pip-audit / cargo-audit (optional)
6Web SecurityMissing security headers (CSP, CORS, HSTS), CSRF, cookie flags, file upload flaws, open redirectsClaude-native analysis using web-security-patterns.md
7Supply Chain SecurityLock file integrity, dependency confusion, typosquatting, unpinned versions, malicious packagesPython lockfile checker + Claude-native analysis
8CI/CD SecurityGitHub Actions script injection, overly permissive permissions, unpinned actions, secret exposure in workflowsClaude-native analysis using cicd-security.md
9Docker & Container SecurityRoot user, unpinned base images, secrets in layers, privileged containers, Docker socket exposureClaude-native analysis using iac-docker.md
10Error HandlingDebug mode in production, stack trace exposure, empty catch blocks, missing error boundariesClaude-native analysis using error-handling-patterns.md
11Logging SecuritySensitive data in logs, log injection, missing security event loggingClaude-native analysis using logging-patterns.md

Standards Coverage

Cyber Neo maps every finding to industry standards:

  • All 10 OWASP 2025 Top 10 categories — including the two new entries: A03 Software Supply Chain Failures and A10 Mishandling of Exceptional Conditions
  • 15+ CWE Top 25 (2025) items — XSS, SQLi, CSRF, command injection, SSRF, deserialization, path traversal, missing auth, broken crypto, hardcoded credentials, and more
  • CVSS-aligned severity scoring — Critical (9.0-10.0), High (7.0-8.9), Medium (4.0-6.9), Low (1.0-3.9), Info (0.0-0.9)

Supported Languages & Frameworks

LanguageFrameworksReference File
JavaScript / TypeScriptExpress, Next.js, React, Vue, Angular, Fastify, NestJS, Koa, Electronlang-javascript.md (924 lines)
PythonDjango, Flask, FastAPI, Tornado, Starlettelang-python.md (935 lines)
Any languageGeneric SAST patterns (eval, exec, hardcoded creds, command injection)Built into SKILL.md

Coming in v0.2: Go, Ruby/Rails, Java/Spring, Rust, PHP/Laravel


Installation

cd ~/.claude/skills
git clone https://github.com/Hainrixz/cyber-neo.git

That’s it. Claude Code automatically discovers the skill.

git clone https://github.com/Hainrixz/cyber-neo.git ~/projects/cyber-neo
ln -s ~/projects/cyber-neo ~/.claude/skills/cyber-neo

Option 3: Claude Code Plugin Marketplace

/plugin install cyber-neo

Marketplace availability coming soon.

Verify Installation

Open Claude Code and type:

/cyber-neo

If installed correctly, Cyber Neo will ask you for a project path to scan.


Usage

Basic Scan

# Scan a specific project
/cyber-neo /path/to/your/project

# Scan the current working directory
/cyber-neo .

What Happens When You Run It

 Phase 1: Reconnaissance
   Detects your tech stack, frameworks, and infrastructure
   Estimates project scope and applies scanning tier

 Phase 2-6: Parallel Analysis (5 subagents)
   Dependency vulnerabilities (SCA)
   Code security patterns (SAST)
   Secret detection (60+ regex patterns)
   Configuration & infrastructure checks
   Supply chain & CI/CD security

 Phase 7: Report Generation
   Deduplicates, scores, and classifies findings
   Generates professional security report

Output

The report is saved to your Desktop:

~/Desktop/cyber-neo-report-{project-name}-{YYYY-MM-DD}.md

Report Format

Every Cyber Neo report includes:

Executive Summary

Risk Score: 67/100 (High Risk)

| Severity | Count |
|----------|-------|
| Critical | 2     |
| High     | 5     |
| Medium   | 8     |
| Low      | 3     |
| Info     | 4     |

Top 3 Priority Actions:
1. Fix SQL injection in src/api/users.js:42 — use parameterized queries
2. Rotate leaked AWS key in .env — key is active and exposed
3. Add authentication to /api/admin routes — currently public

Detailed Findings

Each finding includes:

[CN-001] SQL Injection in User Query
 Severity: Critical (CVSS ~9.8)
 CWE: CWE-89 (SQL Injection)
 OWASP: A05:2025 (Injection)
 Location: src/api/users.js:42

 Description: User input is directly concatenated into SQL query
 without parameterization, enabling SQL injection attacks.

 Evidence:
   const query = `SELECT * FROM users WHERE id = ${req.params.id}`;

 Remediation:
   const query = 'SELECT * FROM users WHERE id = $1';
   const result = await db.query(query, [req.params.id]);

Additional Sections

  • Dependency Vulnerabilities — Table of CVEs with package names, versions, and fix versions
  • Supply Chain Assessment — Lock file status, dependency pinning, CI/CD pipeline security
  • Scan Metadata — Files scanned, coverage percentage, tools used, scan duration

How It Works — Architecture Deep Dive

Cyber Neo is built as a Claude Code skill — a markdown-based prompt that orchestrates Claude’s analysis capabilities. The architecture has three layers:

Layer 1: SKILL.md — The Orchestration Engine

The SKILL.md file (563 lines) is the brain of Cyber Neo. It contains:

  • 7-phase analysis pipeline with explicit instructions for each phase
  • Subagent dispatch templates for parallel analysis
  • Severity scoring rubric aligned with CVSS
  • Report generation instructions with deduplication and classification rules
  • Safety constraints (read-only iron law) reinforced in every subagent prompt
  • Edge case handling for empty projects, unsupported languages, and large codebases

Layer 2: Reference Files — The Security Knowledge Base

14 reference files totaling 10,000+ lines of security patterns:

references/
├── owasp-top-10.md            # OWASP 2025 classification + scoring guide
├── cwe-top-25.md              # CWE mappings with detection patterns
├── secrets-patterns.md        # 60+ regex patterns for secret detection
├── auth-authz-patterns.md     # JWT, sessions, RBAC, IDOR patterns
├── crypto-patterns.md         # Weak crypto, hardcoded keys, TLS bypass
├── web-security-patterns.md   # Headers, CORS, CSRF, SSRF, uploads, redirects
├── error-handling-patterns.md # Debug mode, stack traces, empty catches
├── logging-patterns.md        # Sensitive data in logs, log injection
├── cicd-security.md           # GitHub Actions injection, permissions
├── supply-chain.md            # Dependency confusion, typosquatting, lock files
├── lang-javascript.md         # Node/Express/Next.js/React patterns (924 lines)
├── lang-python.md             # Django/Flask/FastAPI patterns (935 lines)
├── iac-docker.md              # Dockerfile/Compose security (1,005 lines)
└── report-template.md         # Report format specification

Each reference file contains:

  • Grep-ready regex patterns Claude can use for analysis
  • Vulnerable code examples showing the actual problem
  • Secure code examples showing the fix
  • CWE and OWASP 2025 mappings for classification
  • Severity ratings for consistent scoring

Layer 3: Python Scripts — Batch Processing

Two Python scripts handle tasks where batch processing is faster than sequential Claude analysis:

ScriptPurposeLines
scan_secrets.pyRegex-based secret scanning across all files. 60+ patterns covering AWS, GCP, GitHub, Slack, Stripe, database credentials, private keys, API keys, and more. Includes smart allowlisting to reduce false positives.510
check_lockfiles.pyLock file integrity verification for 10 package managers (npm, yarn, pnpm, bun, pip, pipenv, poetry, cargo, bundler, composer, Go). Detects missing lock files, unpinned dependencies, and risky lifecycle scripts.340

Both scripts:

  • Use only Python standard library (zero dependencies)
  • Output structured JSON for easy parsing
  • Handle edge cases gracefully (empty dirs, missing files, binary files)
  • Are strictly read-only — never modify the target project

Optional: External Tool Integration

Cyber Neo works out of the box using Claude-native analysis. For deeper scanning, install these optional tools:

ToolCategoryInstallWhat It Adds
SemgrepSASTbrew install semgrep3,000+ community rules for 30+ languages
TrivySCAbrew install trivyComprehensive dependency vulnerability database
GitleaksSecretsbrew install gitleaksGit history scanning for committed secrets
pip-auditPython SCApip install pip-auditPython package vulnerability checking
cargo-auditRust SCAcargo install cargo-auditRust crate vulnerability checking

When these tools are installed, Cyber Neo automatically detects and uses them alongside its built-in analysis for deeper coverage.


Scope Tiering — How It Handles Large Projects

Cyber Neo adapts its scanning strategy based on project size:

TierFile CountStrategy
Small< 1,000Full scan — every source file analyzed
Medium1,000 - 10,000Targeted scan — prioritizes src/, app/, API routes, auth middleware, config files
Large10,000+Critical-path scan — focuses on entry points, auth, config, deps. Reports coverage percentage

The final report always shows how many files were scanned vs. skipped, so you know exactly what was covered.


Safety Guarantees

Cyber Neo follows a strict read-only iron law:

RuleDescription
Never modifies filesYour project files are never changed, deleted, or created
Never executes codeNo npm start, python app.py, or any project execution
Never installs packagesNo npm install, pip install, or dependency modifications
Never runs fix commandsNo npm audit --fix or auto-remediation
Single write operationOnly writes the report file to ~/Desktop/
Secrets are redactedDetected secrets are never included in the report

These constraints are enforced at the top level AND in every subagent prompt.


OWASP 2025 Top 10 Coverage Map

IDCategoryWhere Addressed
A01:2025Broken Access Controlauth-authz-patterns.md — missing middleware, IDOR, privilege escalation
A02:2025Security Misconfigurationweb-security-patterns.md + error-handling-patterns.md — headers, debug mode, env config
A03:2025Software Supply Chain Failuressupply-chain.md + cicd-security.md — dep confusion, typosquatting, CI injection
A04:2025Cryptographic Failurescrypto-patterns.md + secrets-patterns.md — weak algorithms, hardcoded keys
A05:2025Injectionlang-javascript.md + lang-python.md + web-security-patterns.md — SQLi, XSS, SSRF
A06:2025Insecure Designauth-authz-patterns.md + web-security-patterns.md — structural design flaws
A07:2025Authentication Failuresauth-authz-patterns.md — JWT, sessions, password hashing, OAuth
A08:2025Software/Data Integrity Failureslang-*.md + supply-chain.md — deserialization, dependency integrity
A09:2025Logging/Monitoring Failureslogging-patterns.md — sensitive data in logs, missing security logging
A10:2025Mishandling of Exceptional Conditionserror-handling-patterns.md — empty catches, stack traces, debug mode

Remediation Workflow

After running Cyber Neo, we recommend a test-driven security fix approach:

1. Read the report — start with Critical findings
2. Pick the highest-severity finding
3. Write a test that proves the vulnerability exists
4. Apply the fix from the remediation guidance
5. Run the test — verify it passes
6. Re-run /cyber-neo to confirm the finding is resolved
7. Repeat for the next finding

If you have the Superpowers plugin installed, use its TDD workflow for structured remediation.


Skill Integration

Cyber Neo works with other Claude Code skills for enhanced analysis:

SkillIntegration
/last30daysResearches emerging threats and community discussions about your detected stack
/deep-researchLooks up context on unfamiliar CVEs or emerging threats found during scan
SuperpowersTDD-driven remediation workflow for fixing findings systematically

Project Structure

cyber-neo/
├── .claude-plugin/
│   └── plugin.json                        # Plugin metadata
├── skills/
│   └── cyber-neo/
│       ├── SKILL.md                       # Orchestration engine (563 lines)
│       ├── scripts/
│       │   ├── scan_secrets.py            # Batch secret scanner (510 lines)
│       │   └── check_lockfiles.py         # Lock file checker (340 lines)
│       └── references/                    # Security knowledge base (14 files, 10K+ lines)
│           ├── owasp-top-10.md
│           ├── cwe-top-25.md
│           ├── secrets-patterns.md
│           ├── auth-authz-patterns.md
│           ├── crypto-patterns.md
│           ├── web-security-patterns.md
│           ├── error-handling-patterns.md
│           ├── logging-patterns.md
│           ├── cicd-security.md
│           ├── supply-chain.md
│           ├── lang-javascript.md
│           ├── lang-python.md
│           ├── iac-docker.md
│           └── report-template.md
├── CLAUDE.md                              # Contributor guidelines
├── LICENSE                                # MIT
└── README.md                              # This file

Roadmap

v0.1.0 (Current)

  • 7-phase analysis pipeline with parallel subagents
  • JavaScript/TypeScript + Python language support
  • 14 security reference files (10,000+ lines)
  • 60+ secret detection patterns
  • 10 package manager support for lock file checks
  • Full OWASP 2025 Top 10 and CWE Top 25 coverage
  • Professional report generation with CWE/OWASP mapping

v0.2.0 (Planned)

  • Go, Ruby/Rails, Java/Spring, Rust language patterns
  • Kubernetes and Terraform/IaC security scanning
  • OWASP Top 10 for LLMs (prompt injection, sensitive data in AI apps)
  • Mobile security patterns (React Native, Flutter)
  • Serverless/Lambda security patterns
  • GraphQL security analysis
  • SARIF output format for CI/CD integration
  • Configuration sub-skill (/cyber-neo:config)

v0.3.0 (Future)

  • Session-start hook for automatic security context
  • ASVS (Application Security Verification Standard) mapping
  • Trend tracking (re-scan and diff findings over time)
  • Cross-platform support (Cursor, Copilot CLI, Windsurf)
  • CI/CD integration mode (GitHub Action wrapper)
  • Race condition detection patterns

Contributing

We welcome contributions from the community. See CLAUDE.md for detailed contributor guidelines.

Key Principles

  1. SKILL.md is the product — its quality determines how good the agent is
  2. Reference files are pure knowledge — grep-ready patterns with CWE/OWASP mappings
  3. Scripts use only standard library — zero pip dependencies
  4. Every finding needs classification — CWE ID, OWASP category, severity, and remediation
  5. Read-only on target projects — never modify what we’re scanning

How to Add a New Language

  1. Create references/lang-{language}.md following the existing pattern
  2. Add framework detection patterns, vulnerability patterns with grep regex, and secure/vulnerable code examples
  3. Map every pattern to CWE and OWASP 2025 categories
  4. Update SKILL.md Phase 1.1 to detect the new language
  5. Update SKILL.md Phase 1.3 to load the new reference file
  6. Test against a deliberately vulnerable project in that language

Community

Cyber Neo is shipped by @soyenriquerocha and built by the Tododeia community — a growing network of developers building apps, tools, and products together. We believe every developer deserves access to enterprise-grade security tooling, for free.


Acknowledgments

Cyber Neo builds on the shoulders of the security community:


Shipped by @soyenriquerocha | Built with purpose. Open source forever.

Protecting the apps our community builds — one scan at a time.

Get Started | Report an Issue | Join the Community | Follow @soyenriquerocha