Getting Started
Ghost Security Agent
Ghost Security Agent is an agent-native application security plugin for Claude Code. It gives your AI coding agent the tools and skills to find vulnerabilities, prove they're real, and fix them, all inside your existing development workflow.
Poltergeist
Secret scanner with dual-engine pattern matching and entropy analysis.
Wraith
Dependency scanner powered by the OSV database with 500K+ known CVEs.
Reaper
MITM HTTPS proxy for live vulnerability validation.
Exorcist
AI-powered code analysis covering 89 vulnerability types.
These four tools are composed by an AI skills layer that orchestrates them into a complete security pipeline, from discovery to proof to fix. Get started with the installation and usage guide.
How Ghost Security Agent works
Ghost Security Agent is built on a simple idea: real tools produce real data, and AI adds judgment on top.
Each tool is a standalone binary that does one job well. Poltergeist scans for secrets. Wraith scans dependencies. Reaper captures live traffic. These deterministic tools that produce structured, reliable output.
The AI layer comes in through AI skills, orchestration prompts that compose these tools with reasoning. A skill runs Poltergeist, reads the results, examines the surrounding code, and tells you whether each match is a real leaked credential or a benign artifact that can be ignored.
This two-layer architecture means:
- Ground truth comes from tools. Pattern matches, CVE lookups, and traffic captures are deterministic and auditable.
- Judgment comes from AI. Exploitability analysis, context assessment, and prioritization use the same reasoning a security engineer would.
- You get findings, not alerts. Every result includes context about why it matters and what to do about it.
Ghost Security Agent follows a three-stage loop: find, validate, fix. Multiple scanners run in parallel, AI analyzes each candidate for exploitability, and findings include remediation guidance your agent can apply directly. Read more about how the scan lifecycle works.
Open source and composable
Ghost Security Agent and its underlying tools are fully open source. Everything is available for inspection and contribution.
The tools can also be used standalone. You can use Poltergeist for secret scanning without touching the rest of the Ghost Security Agent. The skills compose them into a pipeline, but the pipeline is optional. Use as much or as little as your workflow needs.
- Tools are Go binaries distributed via GitHub releases
- Skills are prompt files that any compatible AI agent can execute
- Rules and criteria are YAML files you can extend, customize, or replace
- Everything runs locally. Results are cached to speed up subsequent runs

