Skip to content

Rapitzo/security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

claude-secure

A privacy-first wrapper for Claude Code. Scans your environment for secrets before launch, hardens config, and gives you a one-command launcher that won't accidentally leak credentials into a prompt.

Status: personal tool. Use at your own risk; treat as a starting point, not a vetted security product.

What it does

  • Secret pre-flight — scans the working directory and shell environment for likely credentials (API keys, tokens, private keys, .env files) and warns before Claude Code starts
  • Env hardening — strips known-noisy environment variables from the child process so they can't be echoed into the conversation
  • Quiet launcher — wraps claude (and the PowerShell variant) with sane defaults: no telemetry leakage, predictable working dir, scoped permissions

Layout

  • src/claude-secure.sh — POSIX launcher
  • src/claude-secure.ps1 — Windows / PowerShell launcher
  • src/config.json — privacy toggles, filename patterns, and content-secret regexes
  • src/claudeignore.template — drop-in .claudeignore for your projects

Why

I run Claude Code across a lot of projects, some of which sit next to .env files I'd rather not see paged into a chat. This is the smallest possible thing that catches that case before it happens.

Use

./src/claude-secure.sh
# or
pwsh ./src/claude-secure.ps1

config.json lives next to the launcher by default; override with --config PATH or the CLAUDE_SECURE_CONFIG env var.

License

Personal tool. No warranty. Read the source before you trust it.

About

Privacy-first wrapper for Claude Code. Scans env for secrets before launch, hardens config, one-command launcher.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors