Perseus is a comprehensive suite of interactive security assessment skills for Claude Code. It transforms Claude into an autonomous penetration testing partner for your own codebase, capable of performing everything from initial reconnaissance to deep-dive vulnerability research and executive reporting.
Defensive Security Testing: Perseus analyzes your own code to find vulnerabilities before attackers do. This is equivalent to running a security linter or static analyzer.
| Language | Frameworks |
|---|---|
| JavaScript/TypeScript | Express, Fastify, Next.js, Nest.js, Hono, Bun |
| Go | Gin, Echo, Fiber, Chi |
| PHP | Laravel, Symfony, Slim, Lumen |
| Python | FastAPI, Django, Flask, Starlette |
| Rust | Actix-web, Axum, Rocket, Warp |
| Java | Spring Boot, Quarkus, Micronaut |
| Ruby | Rails, Sinatra, Grape |
| C# | ASP.NET Core, Minimal APIs |
Perseus automatically detects your project's:
- Language & Framework (Next.js, Django, Spring, etc.)
- Database (PostgreSQL, MongoDB, Redis, etc.)
- Infrastructure (Docker, Kubernetes, AWS/GCP/Azure)
- CI/CD (GitHub Actions, GitLab CI, Jenkins)
- AI/LLM (OpenAI, Anthropic, LangChain)
- API Security: REST, GraphQL, WebSocket, gRPC, OAuth, Cache poisoning
- Injection: SQL, NoSQL, Command, SSTI, LDAP, XPath, Log4j
- Infrastructure: Docker, CI/CD, Cloud (AWS/GCP/Azure), Kubernetes
- AI Security: Prompt injection, RAG security, tool use validation
- Client-Side: React, Next.js SSR, Vue, Angular, Server Actions
/plugin install https://github.com/kaivyy/perseus
That's it! Everything is automatic:
- Skills and commands auto-discovered
- Hooks auto-registered
- Context injected on session start
git clone https://github.com/kaivyy/perseus.git ~/.codex/perseus
mkdir -p ~/.agents/skills
ln -sf ~/.codex/perseus/skills ~/.agents/skills/perseusgit clone https://github.com/kaivyy/perseus.git ~/.config/opencode/perseus && \
mkdir -p ~/.config/opencode/plugins ~/.config/opencode/skills && \
ln -sf ~/.config/opencode/perseus/.opencode/plugins/perseus.js ~/.config/opencode/plugins/perseus.js && \
ln -sf ~/.config/opencode/perseus/skills ~/.config/opencode/skills/perseus/plugin uninstall perseus
# Full automated assessment (with smart auto-detect)
/start
# Or run key steps manually
/scan # Phase 1: Reconnaissance
/report # Phase 4: Executive Report
# Optional: run all specialists
/specialistPerseus uses explicit verification modes during assessment:
| Mode | Environment | Verification Style |
|---|---|---|
PRODUCTION_SAFE |
Live production | Passive-first checks + minimal non-disruptive validation |
STAGING_ACTIVE |
Staging/pre-production | Active verification with strict throttling |
LAB_FULL |
Isolated lab | Broad dynamic verification |
LAB_RED_TEAM |
Dedicated security lab | Controlled adversarial chain simulation with kill-switches |
Default mode is PRODUCTION_SAFE when environment is unclear.
Perseus follows a structured 4-phase methodology:
Maps architecture, entry points, dependencies, and attack surface.
| Command | Agents | Output |
|---|---|---|
/scan |
13 parallel agents | deliverables/code_analysis_deliverable.md |
Coverage:
- Architecture & Tech Stack (auto-detect 8 languages)
- Entry Points (API, GraphQL, WebSocket, gRPC)
- Dependencies & CVEs
- Hardcoded Secrets
- Security Patterns (Auth, Authz)
- Injection Sinks & XSS Sinks
- SSRF & Data Flows
- Crypto Usage
- Security Headers & Config
Deep white-box analysis using Negative Analysis Loop (Source → Flow → Sink → Defense → Verdict).
Runs automatically after Scan during /start.
Wave 1: SQL Injection, Command Injection, XSS, Auth, Authz Wave 2: SSRF, Template Injection, Deserialization, Path Traversal, XXE Wave 3: JWT, Crypto, Race Conditions, Business Logic
Verify findings with mode-aware safe Proof-of-Concept payloads.
Runs automatically after Audit during /start.
Safe Payloads Only:
- SQL:
SLEEP(5),AND 1=1 - Command:
sleep 5,whoami - XSS:
alert(1),alert(document.domain) - SSTI:
{{7*7}}→49
Synthesize all findings into professional security report.
| Command | Output |
|---|---|
/report |
deliverables/SECURITY_REPORT.md |
Report Includes:
- Executive Summary & Risk Overview
- Engagement mode and verification coverage
- Technologies Analyzed (language, framework, infrastructure)
- Verified Exploits with PoC
- Infrastructure Security (Docker, CI/CD, Cloud, K8s)
- AI/LLM Security Findings
- Supply Chain Summary
- Language-specific Remediation Guidance
- Strategic Recommendations
Perseus provides 8 enhanced specialist skills with multi-language support. These run automatically during /start when relevant signals are detected. Use /specialist to force-run all of them.
| Skill | Coverage |
|---|---|
| api | OWASP API Top 10, GraphQL, WebSocket, OAuth, Cache, gRPC |
| injection | NoSQL, LDAP, XPath, SSTI, Command, Log4j, Expression Language |
| crypto | JWT (8 languages), Hashing, Encryption, Key Management |
| supply-chain | CVEs (8 package managers), Typosquatting, Dependency Confusion |
| file | Path Traversal, Upload Bypass, XXE, Zip Slip (8 languages) |
| logic | Business Logic, Race Conditions, AI/LLM Security, Price Manipulation |
| client | React, Next.js SSR, Server Actions, Vue, Angular, Svelte |
| config | Docker, CI/CD, Cloud (AWS/GCP/Azure), Kubernetes |
| Command | Description |
|---|---|
/start |
Full automated assessment with smart auto-detect |
/scan |
Phase 1: Reconnaissance |
/report |
Phase 4: Executive Report |
| Command | Description |
|---|---|
/specialist |
Run all specialist skills |
| Command | Description |
|---|---|
/perseus:start |
Full automated assessment |
/perseus:scan |
Reconnaissance |
/perseus:report |
Executive Report |
| Command | Description |
|---|---|
/perseus:specialist |
Run all specialist skills |
After a full assessment, the deliverables/ directory contains:
deliverables/
├── engagement_profile.md # Mode, scope, limits, kill-switch thresholds
├── code_analysis_deliverable.md # Scan results (multi-language)
├── sql_injection_analysis.md # Audit reports
├── command_injection_analysis.md
├── xss_analysis.md
├── auth_analysis.md
├── authz_analysis.md
├── ssrf_analysis.md
├── template_injection_analysis.md
├── deserialization_analysis.md
├── path_traversal_analysis.md
├── xxe_analysis.md
├── jwt_analysis.md
├── crypto_analysis.md
├── race_condition_analysis.md
├── business_logic_analysis.md
├── api_security_analysis.md # Specialist reports
├── injection_deep_analysis.md
├── crypto_security_analysis.md
├── supply_chain_analysis.md
├── file_security_analysis.md
├── client_side_analysis.md
├── config_security_analysis.md # Includes Docker/CI/K8s
├── verification_scope.md # Verification boundaries and approved test window
├── exploitation_report.md # Verified exploits
└── SECURITY_REPORT.md # Final executive report
perseus/
├── commands/ # Command definitions
│ ├── scan.md # Short aliases
│ ├── report.md
│ ├── start.md
│ ├── specialist.md
│ ├── perseus-scan.md # Full commands
│ ├── perseus-report.md
│ ├── perseus-start.md
│ └── perseus-specialist.md
├── skills/
│ └── perseus/
│ ├── scan/SKILL.md # Core skills
│ ├── audit/SKILL.md
│ ├── exploit/SKILL.md
│ ├── report/SKILL.md
│ ├── start/SKILL.md
│ ├── using-perseus/SKILL.md
│ └── specialists/ # Specialist skills
│ ├── api/SKILL.md
│ ├── injection/SKILL.md
│ ├── crypto/SKILL.md
│ ├── supply-chain/SKILL.md
│ ├── file-security/SKILL.md
│ ├── logic/SKILL.md
│ ├── client/SKILL.md
│ ├── config/SKILL.md
│ └── all/SKILL.md
├── scripts/
│ ├── post-install.sh # Auto symlink + hook patch
│ └── uninstall.sh
├── hooks/
│ ├── hooks.json
│ └── session-start.sh
├── tests/
│ ├── README.md
│ ├── run-tests.sh
│ └── validate-structure.cjs
├── LICENSE
└── README.md
./tests/run-tests.shValidates:
- Metadata files (plugin.json, manifest.json)
- Core skills (6 skills)
- Specialist skills (9 skills)
- Short commands (4 commands)
- Perseus commands (4 commands)
Perseus is designed for defensive security testing only:
- All analysis is performed on your own codebase
- Safe payloads only (no destructive operations)
PRODUCTION_SAFEis the default mode- Aggressive simulation is restricted to staging/lab modes
LAB_RED_TEAMrequires isolated environment and non-production data- Kill-switch can stop active tests with
ABORTED-SAFETY - No data exfiltration
- Evidence-based reporting (no hallucinations)
- Equivalent to running security linters or SAST tools
Problem: Perseus scan/start fails with error like:
Error: PreToolUse:Write hook error: ⚠️ Security Warning: dangerouslySetInnerHTML...
Cause: The security-guidance plugin blocks files containing security-related keywords, even in documentation.
Solution 1: Automatic (Recommended)
Restart your Claude Code session. Perseus auto-patches the security hook on session start:
/clear
# Then run Perseus again
/scanSolution 2: Manual Patch
If auto-patch doesn't work, run manually:
~/.claude/plugins/perseus/scripts/post-install.shSolution 3: Patch All Hook Locations
The security hook may exist in multiple locations (cache + marketplaces). Patch all:
# Find all hook locations
find ~/.claude -name "security_reminder_hook.py"
# The script patches all locations automatically
bash ~/.claude/plugins/perseus/hooks/session-start.shSolution 4: Disable Security Hook (Temporary)
export ENABLE_SECURITY_REMINDER=0Problem: deliverables/ folder is empty after scan.
Cause: Hook blocked file writing (see above).
Solution: Fix the hook issue, then run /scan again.
Problem: /scan or /start says skill not found.
Solution: Run the post-install script:
~/.claude/plugins/perseus/scripts/post-install.shThis creates all necessary symlinks automatically.
Problem: Auto-patch doesn't happen on session start.
Solution: Verify hooks.json exists and is valid:
cat ~/.claude/plugins/perseus/hooks/hooks.jsonShould contain SessionStart configuration.
- Simplified slash commands to 3 main entries plus
/specialist - Renamed command files to Windows-safe filenames
- Updated docs and structure validation to match new command set
- Added engagement modes:
PRODUCTION_SAFE,STAGING_ACTIVE,LAB_FULL,LAB_RED_TEAM - Added mode-aware verification and specialist safety gates
- Added kill-switch behavior and
ABORTED-SAFETYoutcomes - Added new deliverables:
engagement_profile.md,verification_scope.md - Improved reporting with verification coverage and context-aware risk weighting
- Multi-Language Support: Added support for 8 languages (JS, Go, PHP, Python, Rust, Java, Ruby, C#)
- Smart Auto-Detect:
/startnow auto-detects language, framework, and infrastructure - Infrastructure Security: Added Docker, CI/CD, Cloud (AWS/GCP/Azure), Kubernetes analysis
- AI/LLM Security: Added prompt injection, RAG security, tool use validation
- Enhanced Specialists: All 8 specialists now support multiple languages
- Improved Report: Added infrastructure, AI, and supply chain sections
- Initial release with core phases and specialists
| Platform | Guide |
|---|---|
| Claude Code | docs/README.claude.md |
| Codex | docs/README.codex.md |
| OpenCode | docs/README.opencode.md |
MIT
