Ghost Validate
Ghost-validate silently assesses application security posture against best practices without disrupting live operations.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add ghost-validate npx -- -y @trustedskills/ghost-validate
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"ghost-validate": {
"command": "npx",
"args": [
"-y",
"@trustedskills/ghost-validate"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The Ghost Validate skill assesses security findings to determine if they are true positives or false positives. It analyzes provided finding data, examines relevant source code, and optionally performs live validation using a proxy tool (Reaper) to confirm exploitability. The skill then classifies the finding as True Positive, True Positive (Confirmed), False Positive, or Inconclusive, providing supporting evidence and recommendations.
When to use it
- When you have received a security vulnerability report from a scanner and want to verify its accuracy.
- To reduce noise in your vulnerability management process by filtering out false positives.
- To understand the root cause of a reported vulnerability and inform remediation efforts.
Key capabilities
- Finding Analysis: Extracts key information from provided findings, including vulnerability class, claim, affected endpoint, code location, and existing validation evidence.
- Source Code Review: Analyzes source code to verify the specific claim made in the finding, looking for indirect protections or unreachable code paths.
- Live Validation (Optional): Uses a proxy tool (Reaper) to interact with a live application instance and attempt exploitation of the reported vulnerability.
- Classification & Reporting: Classifies findings as True Positive, True Positive (Confirmed), False Positive, or Inconclusive, providing detailed evidence summaries, code analysis, and recommendations.
Example prompts
- "Validate this security finding: [paste finding text here]"
- "Can you assess the validity of a vulnerability report located at /path/to/finding.txt?"
- “I have a potential SQL injection issue reported; can you validate it?”
Tips & gotchas
- The skill requires access to the application's source code for accurate analysis.
- Live validation is optional and requires a live, accessible instance of the application.
- For inconclusive findings, be prepared to provide additional information or context to help the skill reach a determination.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.