medusa-security
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseMedusa Security Skill
Medusa安全扫描Skill
Identity
功能定位
AI-first security scanner integration skill. Leverages Medusa's 76 scanners and 3,000+ detection
patterns for comprehensive security analysis including AI/ML-specific vulnerability detection.
AI优先的安全扫描集成Skill。利用Medusa的76款扫描器和3000+检测规则,开展全面的安全分析,包括AI/ML专属漏洞检测。
Capabilities
核心能力
- Full Scan — All 76 scanners, comprehensive security analysis
- AI-Only Scan — Prompt injection, MCP security, agent security, RAG security
- Quick Scan — Git-changed files only for rapid development feedback
- Targeted Scan — Specific scanner categories (mcp, secrets, prompt-injection, etc.)
- SARIF Output Parsing — Standard SARIF v2.1.0 structured findings
- JSON Output Parsing — Medusa-native JSON format
- OWASP Mapping — Maps findings to OWASP Agentic AI (ASI01-10) and OWASP Top 10 (A01-10)
- Remediation Guidance — Links findings to agent-studio skills and agents
- CI/CD Integration — Fail-on thresholds, SARIF upload for GitHub Code Scanning
- 全量扫描 — 启用全部76款扫描器,进行全面安全分析
- 仅AI扫描 — 检测提示注入、MCP安全、Agent安全、RAG安全相关漏洞
- 快速扫描 — 仅扫描Git变更文件,为开发提供快速反馈
- 定向扫描 — 针对特定扫描器类别(mcp、密钥、提示注入等)进行扫描
- SARIF输出解析 — 支持标准SARIF v2.1.0结构化结果
- JSON输出解析 — 支持Medusa原生JSON格式
- OWASP映射 — 将检测结果映射至OWASP Agentic AI(ASI01-10)和OWASP Top 10(A01-10)
- 修复指导 — 将检测结果关联至agent-studio的Skill和Agent
- CI/CD集成 — 支持失败阈值配置、上传SARIF至GitHub Code Scanning
Prerequisites
前置要求
Python 3.10+
pip install medusa-securityCheck installation:
python -m medusa --versionPython 3.10+
pip install medusa-security验证安装:
python -m medusa --versionWorkflow: Full Security Scan
工作流:全量安全扫描
bash
undefinedbash
undefinedStep 1: Verify installation
步骤1:验证安装
python -m medusa --version
python -m medusa --version
Step 2: Run scan
步骤2:执行扫描
medusa scan . --format sarif --fail-on high
medusa scan . --format sarif --fail-on high
Step 3: Parse output (use scripts/main.cjs)
步骤3:解析输出(使用scripts/main.cjs)
node .claude/skills/medusa-security/scripts/main.cjs --mode full --target .
node .claude/skills/medusa-security/scripts/main.cjs --mode full --target .
Step 4: Review findings by severity
步骤4:按严重程度查看结果
CRITICAL → immediate fix required
CRITICAL → 立即修复
HIGH → fix before release
HIGH → 发布前修复
MEDIUM → fix in next sprint
MEDIUM → 下一个迭代修复
LOW → track and address
LOW → 跟踪并处理
undefinedundefinedWorkflow: AI-Only Scan
工作流:仅AI扫描
bash
medusa scan . --format sarif --ai-onlyScans only: prompt injection (800+ patterns), MCP security (400+ patterns), agent security
(500+ patterns), RAG security (300+ patterns).
bash
medusa scan . --format sarif --ai-only仅扫描以下内容:提示注入(800+规则)、MCP安全(400+规则)、Agent安全(500+规则)、RAG安全(300+规则)。
Workflow: Quick Scan (Development)
工作流:快速扫描(开发阶段)
bash
medusa scan . --format sarif --quickOnly scans git-changed files. Use during development for rapid feedback.
bash
medusa scan . --format sarif --quick仅扫描Git变更文件,适用于开发阶段快速获取反馈。
Workflow: Targeted Scan
工作流:定向扫描
bash
undefinedbash
undefinedMCP security only
仅扫描MCP安全
medusa scan . --format sarif --scanners mcp-server,mcp-config
medusa scan . --format sarif --scanners mcp-server,mcp-config
Secrets only
仅扫描密钥
medusa scan . --format sarif --scanners secrets,gitleaks,env
medusa scan . --format sarif --scanners secrets,gitleaks,env
AI context files only
仅扫描AI上下文文件
medusa scan . --format sarif --scanners ai-context
undefinedmedusa scan . --format sarif --scanners ai-context
undefinedOutput Processing
输出处理
The skill uses helper scripts located at :
.claude/skills/medusa-security/scripts/| Script | Purpose |
|---|---|
| Parses SARIF v2.1.0 output |
| Parses Medusa JSON output |
| Formats findings with OWASP mapping |
| Orchestrates the full pipeline |
| Wraps Medusa CLI invocation |
| Deterministic report writer (no Glob recursion) |
本Skill使用位于的辅助脚本:
.claude/skills/medusa-security/scripts/| 脚本名称 | 用途 |
|---|---|
| 解析SARIF v2.1.0输出格式 |
| 解析Medusa原生JSON输出格式 |
| 为检测结果添加OWASP映射信息并格式化 |
| 编排完整的扫描处理流程 |
| 封装Medusa CLI调用逻辑 |
| 生成确定性报告(避免Glob递归超时) |
Using the Pipeline
流程使用示例
bash
undefinedbash
undefinedFull scan with structured output
全量扫描并生成结构化输出
node .claude/skills/medusa-security/scripts/main.cjs --mode full --target .
node .claude/skills/medusa-security/scripts/main.cjs --mode full --target .
AI-only scan
仅AI扫描
node .claude/skills/medusa-security/scripts/main.cjs --mode ai-only --target .
node .claude/skills/medusa-security/scripts/main.cjs --mode ai-only --target .
Quick scan (git-changed files)
快速扫描(仅Git变更文件)
node .claude/skills/medusa-security/scripts/main.cjs --mode quick --target .
undefinednode .claude/skills/medusa-security/scripts/main.cjs --mode quick --target .
undefinedDeterministic Security Review (Recommended in Claude sessions)
确定性安全评审(推荐在Claude会话中使用)
Use this when you need the final security review report and want to avoid recursive timeouts:
Globbash
node .claude/skills/medusa-security/scripts/security-review.cjsThis writes:
/.claude/context/reports/security-review-medusa-scan-2026-02-17.mdand performs fixed-path checks on:
.claude/hooks/.claude/lib/.claude/skills/medusa-security/scripts/.claude/CLAUDE.md
当你需要最终安全评审报告并希望避免递归超时问题时,使用以下命令:
Globbash
node .claude/skills/medusa-security/scripts/security-review.cjs该命令会生成报告文件:
/.claude/context/reports/security-review-medusa-scan-2026-02-17.md并对以下路径进行固定路径检查:
.claude/hooks/.claude/lib/.claude/skills/medusa-security/scripts/.claude/CLAUDE.md
Important Runtime Guardrail
重要运行时注意事项
- Avoid recursive glob patterns like in long sessions.
.claude/skills/medusa-security/**/* - Prefer direct file reads and deterministic script entry points.
- 在长会话中避免使用类似的递归glob模式。
.claude/skills/medusa-security/**/* - 优先使用直接文件读取和确定性脚本入口。
OWASP Mapping
OWASP映射
Findings are automatically mapped to:
- OWASP Agentic AI Top 10 (ASI01-10): Goal Hijacking, Tool Misuse, Context Poisoning, etc.
- OWASP Top 10 (A01-10): Broken Access Control, Injection, Cryptographic Failures, etc.
检测结果会自动映射至:
- OWASP Agentic AI Top 10(ASI01-10):目标劫持、工具滥用、上下文污染等。
- OWASP Top 10(A01-10):访问控制失效、注入攻击、加密机制失败等。
Severity Triage
严重程度分级处理
| Severity | Action | Timeline |
|---|---|---|
| CRITICAL | Immediate fix | Before any merge |
| HIGH | Fix before release | Same sprint |
| MEDIUM | Fix in next sprint | Next cycle |
| LOW | Track and address | Backlog |
| 严重程度 | 处理措施 | 时间要求 |
|---|---|---|
| CRITICAL | 立即修复 | 合并代码前完成 |
| HIGH | 发布前修复 | 同一迭代内完成 |
| MEDIUM | 下一个迭代修复 | 下一周期内完成 |
| LOW | 跟踪并处理 | 放入待办清单 |
Agent Integration
Agent集成
| Agent | Usage |
|---|---|
| Primary consumer. Use for comprehensive security reviews. |
| Use for targeted vulnerability scanning with authorization. |
| Use AI-only scan as part of code review workflow. |
| Agent名称 | 用途说明 |
|---|---|
| 主要使用者,用于全面安全评审。 |
| 用于授权后的定向漏洞扫描。 |
| 将仅AI扫描作为代码评审流程的一部分。 |
CI/CD Integration
CI/CD集成
yaml
undefinedyaml
undefinedGitHub Actions example
GitHub Actions示例
- name: Security Scan run: | pip install medusa-security medusa scan . --format sarif --fail-on high -o reports/
- name: Upload SARIF uses: github/codeql-action/upload-sarif@v3 with: sarif_file: reports/medusa-results.sarif
undefined- name: Security Scan run: | pip install medusa-security medusa scan . --format sarif --fail-on high -o reports/
- name: Upload SARIF uses: github/codeql-action/upload-sarif@v3 with: sarif_file: reports/medusa-results.sarif
undefinedMemory Protocol
记忆协议
After scanning:
- Record new vulnerability patterns in
patterns.json - Log significant findings in
issues.md - Track scan history for trend analysis
- Use for recurring false positives
recordGotcha()
javascript
const manager = require('.claude/lib/memory/memory-manager.cjs');
manager.recordGotcha({
text: 'False positive: medusa flags X pattern in Y context',
area: 'security-scanning',
});
manager.recordPattern({
text: 'Prompt injection found in CLAUDE.md context files',
area: 'ai-security',
});扫描完成后:
- 在中记录新的漏洞规则
patterns.json - 在中记录重要检测结果
issues.md - 跟踪扫描历史以进行趋势分析
- 使用记录重复出现的误报
recordGotcha()
javascript
const manager = require('.claude/lib/memory/memory-manager.cjs');
manager.recordGotcha({
text: 'False positive: medusa flags X pattern in Y context',
area: 'security-scanning',
});
manager.recordPattern({
text: 'Prompt injection found in CLAUDE.md context files',
area: 'ai-security',
});Related Skills
相关Skill
- — Threat modeling and OWASP analysis
security-architect - — CodeQL and Semgrep SARIF analysis
static-analysis - — Create custom Semgrep rules
semgrep-rule-creator - — Detect hardcoded credentials
insecure-defaults - — Discover vulnerability variants
variant-analysis
- — 威胁建模与OWASP分析
security-architect - — CodeQL和Semgrep SARIF分析
static-analysis - — 创建自定义Semgrep规则
semgrep-rule-creator - — 检测硬编码凭证
insecure-defaults - — 发现漏洞变体
variant-analysis