MCPHub LabRegistryHarmonicSecurity/claudit-sec
HarmonicSecurity

HarmonicSecurity/claudit sec

Built by HarmonicSecurity β€’ 97 stars

What is HarmonicSecurity/claudit sec?

Security audit tool for Claude Desktop and Claude Code on macOS β€” single-command visibility into MCP servers, extensions, plugins, connectors, scheduled tasks, and permissions.

How to use HarmonicSecurity/claudit sec?

1. Install a compatible MCP client (like Claude Desktop). 2. Open your configuration settings. 3. Add HarmonicSecurity/claudit sec using the following command: npx @modelcontextprotocol/harmonicsecurity-claudit-sec 4. Restart the client and verify the new tools are active.
πŸ›‘οΈ Scoped (Restricted)
npx @modelcontextprotocol/harmonicsecurity-claudit-sec --scope restricted
πŸ”“ Unrestricted Access
npx @modelcontextprotocol/harmonicsecurity-claudit-sec

Key Features

Native MCP Protocol Support
Real-time Tool Activation & Execution
Verified Standard Implementation
Secure Resource & Context Handling

Optimized Use Cases

Extending AI models with custom local capabilities
Automating system workflows via natural language
Connecting external data sources to LLM context windows

HarmonicSecurity/claudit sec FAQ

Q

Is HarmonicSecurity/claudit sec safe?

Yes, HarmonicSecurity/claudit sec follows the standardized Model Context Protocol security patterns and only executes tools with explicit user-granted permissions.

Q

Is HarmonicSecurity/claudit sec up to date?

HarmonicSecurity/claudit sec is currently active in the registry with 97 stars on GitHub, indicating its reliability and community support.

Q

Are there any limits for HarmonicSecurity/claudit sec?

Usage limits depend on the specific implementation of the MCP server and your system resources. Refer to the official documentation below for technical details.

Official Documentation

View on GitHub

πŸ›‘οΈ CLAUDIT-SEC

Security audit tool for Claude Desktop on macOS β€” including CoWork, extensions, plugins, MCP servers, connectors, and scheduled tasks.

One command. Full visibility. Read-only.

<p align="center"> <img src="media/claudit-terminal.png" alt="CLAUDIT terminal output" width="700"> </p>

πŸ€” Why

Claude Desktop introduces a new class of endpoint risk: AI agents with autonomous execution, persistent scheduled tasks, MCP server integrations, browser-control extensions, and OAuth-authenticated connectors to external services. Most of this configuration lives in JSON files scattered across multiple directories with no centralised visibility.

CLAUDIT gives you that visibility in a single command.

πŸ“ A note on "Code": Claude Desktop includes a built-in agent coding feature called Code (visible in the app's sidebar). This is not the same as Claude Code, the standalone terminal CLI. CLAUDIT primarily audits Claude Desktop and its CoWork features. It does include a basic check of ~/.claude/settings.json (the terminal CLI's config), but the focus is squarely on the Desktop app.

πŸ“‹ What It Audits

AreaWhat's Checked
πŸ–₯️ Desktop SettingskeepAwakeEnabled, sidebar/menuBar preferences
πŸ€– CoWork SettingsScheduled tasks, web search, browser use, dispatch (mobileβ†’desktop), network mode, egress policy, enabled plugins, marketplaces
🏒 WorkspacesMulti-workspace detection, account names, session counts, org indicators (DXT-managed, org-plugins, dispatch-bridge)
πŸ”Œ MCP ServersServer names, commands, arguments, environment variable keys
🧩 Extensions (DXT)Installed extensions, signature status, dangerous tool grants
βš™οΈ Extension SettingsPer-extension allowed directories and configuration
🚦 Extension GovernanceAllowlist enabled/disabled, blocklist entries
πŸ“¦ PluginsInstalled, remote (org-deployed), cached (downloaded)
πŸͺ Plugin HooksLifecycle hooks executing shell commands (PreToolUse, PostToolUse, Stop, etc.)
πŸ”— ConnectorsOAuth-authenticated web services, desktop integrations
🎯 SkillsUser-created, scheduled, session-local, and plugin skills across 9 paths
⏰ Scheduled TasksTask names, cron expressions (with plain English translation)
πŸ” App ConfigNetwork mode, extension allowlist/blocklist keys, device identifiers
πŸ“² DispatchBridge state (OFF/CONFIGURED/ON), active session detection via hostLoopMode and bridge-state.json
πŸ”‡ Disabled MCP ToolsPer-session tools explicitly disabled (with dangerous tool callout)
πŸƒ Runtime StateRunning processes, sleep assertions, LaunchAgents, crontab entries
πŸͺ CookiesCookies and Cookies-journal presence

πŸ“– For a detailed breakdown of every individual check, what it means, and why it matters, see the Findings Reference.

⚑ Getting Started

Prerequisites

RequirementHow to checkHow to install
🍎 macOSYou're on a Macβ€”
🐚 zshzsh --versionShips with macOS since Catalina
πŸ”§ jqjq --versionbrew install jq

Install & Run

git clone https://github.com/HarmonicSecurity/claudit-sec.git
cd claudit-sec
chmod +x claude_audit.sh
./claude_audit.sh

That's it. The script reads your Claude configuration and prints a colour-coded report to the terminal. It never modifies anything.

πŸŽ›οΈ Usage

./claude_audit.sh [OPTIONS]

Options:
  --html [FILE]    Generate a standalone HTML report
  --json           Output structured JSON
  --user USER      Audit a specific user
  --all-users      Audit all users with Claude data (requires root)
  -q, --quiet      Only show WARN and CRITICAL findings
  --version        Print version and exit
  -h, --help       Show usage

Examples

# Default: colour output in terminal
./claude_audit.sh

# Only warnings and critical findings
./claude_audit.sh -q

# Standalone HTML report
./claude_audit.sh --html

# JSON for SIEM ingestion
./claude_audit.sh --json > audit.json

# Specific user
./claude_audit.sh --user jsmith

# All users (run as root via MDM, FleetDM, Jamf, etc.)
sudo ./claude_audit.sh

πŸ’‘ When run as root (uid 0), the script automatically discovers and scans all users with Claude data. No flags needed.

πŸ“Š Output Formats

πŸ–₯️ Terminal (default)

Colour-coded output with Unicode tables and severity indicators.

<p align="center"> <img src="media/claudit-terminal.png" alt="CLAUDIT terminal output" width="700"> </p>

🌐 HTML (--html)

Standalone dark-themed report with collapsible sections. Created with restrictive file permissions (0600).

<p align="center"> <img src="media/claudit-html.png" alt="CLAUDIT HTML report" width="700"> </p>

πŸ“„ JSON (--json)

Structured output for SIEM ingestion. Sensitive fields (OAuth tokens, API keys, secrets) are automatically redacted. Multi-user scans produce a JSON array.

🚨 Severity Levels

SeverityMeaning
🟠 WARNIncreases risk surface β€” e.g. unsigned extensions, autonomous execution enabled
🟑 REVIEWNeeds human judgement β€” e.g. org-deployed plugins, MCP servers present
πŸ”΅ INFOInformational β€” e.g. Claude is running, permissions granted

πŸ“– Documentation

DocDescription
Findings ReferenceEvery individual check CLAUDIT performs, what it means, why it matters (risk, compliance, AI enablement), and what to do about it

πŸ”’ Security Properties

  • Read-only β€” never writes to, modifies, or deletes any audited file
  • No network access β€” all data collected from local filesystem and system commands
  • Sensitive data redacted β€” tokens, keys, and secrets replaced with [REDACTED] in all output formats
  • Minimal privileges β€” runs as current user; root only needed for multi-user scans
  • Single file β€” no dependencies beyond jq
  • Auditable β€” the entire tool is one readable shell script

πŸ’œ Built with Claude Code

This project is built and maintained using Claude Code. We love it. Seriously. If you're building developer tools and haven't tried it yet, you're missing out.

πŸ“„ License

Apache License 2.0 β€” see LICENSE for details.

Global Ranking

8.5
Trust ScoreMCPHub Index

Based on codebase health & activity.

Manual Config

{ "mcpServers": { "harmonicsecurity-claudit-sec": { "command": "npx", "args": ["harmonicsecurity-claudit-sec"] } } }