Rafter is a security CLI that protects your codebase from leaked secrets, dangerous commands, and vulnerable dependencies. It works offline with zero config. No API key, no account, no telemetry.
This file teaches AI agents how to install and use Rafter. If you are an AI coding agent, follow these instructions.
# Node.js (recommended)
npm install -g @rafter-security/cli
# Python (full feature parity)
pip install rafter-cliRun rafter agent init with the flag for your platform. This installs hooks, skills, or MCP config automatically.
# Auto-install all detected platforms
rafter agent init --all
# Or pick your platform
rafter agent init --with-claude-code # Hooks (PreToolUse/PostToolUse) + skills
rafter agent init --with-codex # Skills
rafter agent init --with-cursor # MCP server
rafter agent init --with-gemini # MCP server
rafter agent init --with-windsurf # MCP server
rafter agent init --with-continue # MCP server
rafter agent init --with-aider # MCP server
rafter agent init --with-openclaw # Skills
# Also download Gitleaks for enhanced scanning (optional, falls back to built-in 21-pattern regex)
rafter agent init --with-claude-code --with-gitleaksWhat init does per platform:
| Platform | Integration type | What gets installed |
|---|---|---|
| Claude Code | PreToolUse/PostToolUse hooks + skills | ~/.claude/settings.json (hooks), ~/.claude/skills/rafter/ (skills) |
| Codex CLI | Skills | ~/.agents/skills/rafter/ |
| OpenClaw | Skills | ~/.openclaw/skills/rafter-security.md |
| Cursor | MCP server | ~/.cursor/mcp.json |
| Gemini CLI | MCP server | ~/.gemini/settings.json |
| Windsurf | MCP server | ~/.codeium/windsurf/mcp_config.json |
| Continue.dev | MCP server | ~/.continue/config.json |
| Aider | MCP server | ~/.aider.conf.yml |
Scan files or directories for hardcoded credentials. 21+ built-in patterns (AWS keys, GitHub tokens, Stripe keys, database URIs, private keys, JWTs, etc.). Deterministic -- same input always produces the same output.
# Scan a directory
rafter scan local .
# Scan a specific file
rafter scan local src/config.ts
# Scan only git staged files (use before commits)
rafter scan local --staged
# Scan files changed since a ref
rafter scan local --diff HEAD~1
# JSON output (structured, pipe-friendly)
rafter scan local . --json --quietExit codes (stable contract):
0-- clean, no secrets found1-- secrets detected2-- runtime error (bad path, not a git repo)
JSON output schema (--json):
[
{
"file": "/absolute/path/to/file.ts",
"matches": [
{
"pattern": { "name": "AWS Access Key", "severity": "critical" },
"line": 42,
"redacted": "AKIA************MPLE"
}
]
}
]Raw secret values are never included in output.
Block commits that contain secrets:
# Current repo
rafter agent install-hook
# All repos on this machine
rafter agent install-hook --globalEvaluate shell commands against a 4-tier risk policy:
rafter agent exec "npm install" # low risk -- runs
rafter agent exec "git push --force" # high risk -- requires approval
rafter agent exec "rm -rf /" # critical -- blocked| Risk | Action | Examples |
|---|---|---|
| Critical | Blocked | rm -rf /, fork bombs, dd to device |
| High | Approval required | sudo rm, chmod 777, curl|sh, npm publish |
| Medium | Approval on moderate+ | sudo, chmod, kill -9 |
| Low | Allowed | npm install, git commit, ls |
When installed via rafter agent init --with-claude-code, Rafter registers hooks in ~/.claude/settings.json:
- PreToolUse hooks on
BashandWrite|Edittool calls. Every shell command is evaluated against the risk policy before execution. Dangerous commands are blocked or require approval transparently -- no manual invocation needed. - PostToolUse hooks on all tool calls (
.*matcher). Scans output for accidentally leaked secrets and redacts them.
The hooks read JSON from stdin and write a {"decision": "allow"} or {"decision": "deny", "reason": "..."} response to stdout. This is the Claude Code hook protocol.
Manual hook config (if not using rafter agent init):
{
"hooks": {
"PreToolUse": [
{ "matcher": "Bash", "hooks": [{ "type": "command", "command": "rafter hook pretool" }] },
{ "matcher": "Write|Edit", "hooks": [{ "type": "command", "command": "rafter hook pretool" }] }
],
"PostToolUse": [
{ "matcher": ".*", "hooks": [{ "type": "command", "command": "rafter hook posttool" }] }
]
}
}For MCP-native platforms (Cursor, Gemini, Windsurf, Continue.dev, Aider), Rafter exposes tools over stdio:
rafter mcp serveMCP client config:
{
"mcpServers": {
"rafter": { "command": "rafter", "args": ["mcp", "serve"] }
}
}Tools provided:
scan_secrets-- scan files/directories for secretsevaluate_command-- check if a shell command is allowed by policyread_audit_log-- read security event log with filtersget_config-- read current Rafter configuration
Resources:
rafter://config-- current configurationrafter://policy-- active security policy
SAST/SCA security audits on GitHub repos. Requires RAFTER_API_KEY. Code is deleted immediately after analysis.
export RAFTER_API_KEY="your-key"
rafter run # scan current repo (auto-detected)
rafter scan --repo myorg/myrepo --branch main # scan specific repo
rafter get SCAN_ID # retrieve results
rafter get SCAN_ID --format json # JSON output
rafter usage # check quotaExit codes:
0-- success1-- error2-- scan not found3-- quota exhausted4-- forbidden (check API key)
Drop .rafter.yml in project root for per-repo security policy:
version: "1"
risk_level: moderate
command_policy:
mode: approve-dangerous
blocked_patterns: ["rm -rf /"]
require_approval: ["npm publish"]
scan:
exclude_paths: ["vendor/", "third_party/"]
custom_patterns:
- name: "Internal API Key"
regex: "INTERNAL_[A-Z0-9]{32}"
severity: criticalEvery security event is logged to ~/.rafter/audit.jsonl:
rafter agent audit # last 10 entries
rafter agent audit --last 20 # last 20
rafter agent audit --event secret_detected
rafter agent audit --since 2026-01-01Event types: command_intercepted, secret_detected, content_sanitized, policy_override, scan_executed, config_changed.
Audit third-party skills/extensions before installing them:
rafter agent audit-skill path/to/untrusted-skill.mdDetects embedded secrets, external URLs, high-risk commands (curl|sh, eval(), base64|sh), and obfuscated code.
rafter agent config show # view all
rafter agent config set agent.riskLevel aggressive # set risk level
rafter agent config set agent.commandPolicy.mode deny-list # set policy modeRisk levels: minimal (guidance only), moderate (default), aggressive (approval for most ops).
rafter ci init # auto-detect CI platform
rafter ci init --platform github # GitHub ActionsGitHub Action:
- uses: raftersecurity/rafter-cli@v1
with:
scan-path: '.'
args: '--quiet'rafter brief commands # condensed CLI reference
rafter brief setup/claude-code # platform-specific setup guide
rafter brief security # local security toolkit overview
rafter brief all # everything