-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathpackage.json
More file actions
60 lines (60 loc) · 1.49 KB
/
package.json
File metadata and controls
60 lines (60 loc) · 1.49 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
{
"name": "hardstop-patterns",
"version": "1.0.2",
"description": "Security patterns for detecting dangerous commands and credential file access. Used by HardStop and compatible tools. Part of the Hardstop ecosystem.",
"main": "index.js",
"types": "index.d.ts",
"files": [
"index.js",
"index.d.ts",
"patterns/*.json",
"install.md"
],
"keywords": [
"security",
"patterns",
"hardstop",
"claude-code",
"safety",
"command-detection",
"credential-protection",
"devtools",
"hooks",
"command-validation",
"shell-safety",
"ai-agent-security",
"bash-guardrail",
"pre-execution-check",
"prompt-injection-defense",
"agentic-safety",
"claude-code-hooks",
"llm-command-filter",
"dangerous-command-detection",
"supply-chain-security",
"fail-closed",
"command-allowlist",
"command-blocklist",
"claude-cowork"
],
"author": "ClarityDome <info@clarity-gate.org>",
"license": "MIT",
"repository": {
"type": "git",
"url": "https://github.com/frmoretto/hardstop-patterns"
},
"homepage": "https://github.com/frmoretto/hardstop-patterns#readme",
"bugs": {
"url": "https://github.com/frmoretto/hardstop-patterns/issues"
},
"scripts": {
"test": "cross-env VITE_CJS_IGNORE_WARNING=true vitest run",
"test:watch": "cross-env VITE_CJS_IGNORE_WARNING=true vitest"
},
"engines": {
"node": ">=16.0.0"
},
"devDependencies": {
"cross-env": "^7.0.3",
"vitest": "^4.0.18"
}
}