Claude Code plugins for the INFYNON suite — package security, API flow testing, and shared coding memory.
Universal secure package installation, CVE scanning, auto-fix, dependency auditing, and vulnerability monitoring across 14 ecosystems (npm, yarn, pnpm, bun, pip, uv, poetry, cargo, go, gem, composer, nuget, hex, pub).
AI-driven node-based API flow testing with security probes, TUI visualization, assertion engine, context threading, and automated flow building.
Three-layer memory operating system for codebases:
- Canonical memory — architecture decisions, API contracts, security constraints (highest trust, promoted only)
- Team memory — handoffs, PR notes, caveats, branch context (medium trust, agent-writable)
- User memory — personal observations, task context, experiments (low trust, promotable)
With session hooks (auto-load on start, capture on end), Redis and SQL backends, TUI inspection, and promotion workflows.
INFYNON CLI: github.com/d4rkNinja/infynon-cli
Check if already installed:
infynon --versionnpm install -g infynoncurl -fsSL https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.sh | bashirm https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.ps1 | iexcargo install --git https://github.com/d4rkNinja/infynon-cliPre-built binaries also available on the Releases page for Windows x64, Linux x64/ARM64 (musl), macOS x64/ARM64.
Verify:
infynon --version
infynon pkg --help
infynon trace --help# Add the marketplace
/plugin marketplace add d4rkNinja/code-guardian
# Install plugins
/plugin install infynon-pkg@d4rkNinja
/plugin install infynon-weave@d4rkNinja
/plugin install infynon-trace@d4rkNinja
# Activate
/reload-pluginsOr load locally for development:
claude --plugin-dir ./infynon-pkg --plugin-dir ./infynon-weave --plugin-dir ./infynon-traceThese are contextual skills — once installed, Claude Code automatically knows how to help users with INFYNON. Claude will:
- Check if INFYNON is installed and guide through installation if not found
- Recommend the right
infynoncommands based on what the user is trying to do - Detect lock files and suggest security scans
- Help manage coding memory across canonical, team, and user layers
- Run session hooks to load/save memory automatically
- Guide users through TUI keyboard shortcuts
- Explain vulnerability scan results and fix options
- Recommend CI-friendly flags (
--strict,--auto-fix,--skip-vulnerable,--agent)
| Plugin | Skill | Auto-triggers When |
|---|---|---|
| infynon-pkg | package-security |
User asks about package vulnerabilities, CVE scanning, dependency auditing, or Claude detects lock files in the project |
| infynon-pkg | cve-triage |
User needs help interpreting CVE scan results or prioritizing fixes |
| infynon-pkg | eagle-eye-monitor |
User wants continuous vulnerability monitoring with email alerts |
| infynon-weave | api-testing |
User asks about API testing, flow building, security probes, or Claude detects .infynon/api/ in the project |
| infynon-trace | memory-ops |
User asks about coding memory, notes, handoffs, or Claude detects .infynon/trace/ in the project |
| infynon-trace | canonical-memory |
User asks about architecture decisions, truth memory, or validated knowledge |
| infynon-trace | session-hooks |
Session starts or ends, user asks about memory hooks |
| Plugin | Agent | Purpose |
|---|---|---|
| infynon-pkg | pkg-guardian |
Deep package security analysis, CVE triage, migration guidance, CI setup |
| infynon-weave | api-guardian |
API flow design, node wiring, security probe interpretation, CI pipelines |
| infynon-trace | trace-guardian |
Memory layer management, promotion workflows, session hooks, backend setup |
Trace hooks are installed per-project in .claude/settings.json when the user explicitly asks. They are never auto-installed or placed in system-level settings.
| Hook | Trigger | Behavior |
|---|---|---|
SessionStart |
New conversation begins | Load canonical memory (always), ask about team memory, optionally load user memory, pull from remote |
Stop |
Claude finishes responding | Remind to save observations, compact stale notes, push to remote. Never auto-writes canonical. |
Install hooks:
# Run the install script in your project directory
bash <path-to-code-guardian>/infynon-trace/hooks/install.sh .
# Or ask Claude: "Set up trace hooks for this project"Hooks are written to <your-project>/.claude/settings.json — not ~/.claude/settings.json.
# Scan for vulnerabilities
infynon pkg scan
# Scan + auto-fix
infynon pkg scan --fix
# Install packages securely (wraps any package manager)
infynon pkg npm install express
infynon pkg uv add fastapi
infynon pkg cargo add serde
# CI / non-interactive flags (no prompts)
infynon pkg npm install express --strict high # fail build on critical/high (exit 3)
infynon pkg npm install express --auto-fix # auto-upgrade to safe versions
infynon pkg npm install express --skip-vulnerable # skip bad packages silently
infynon pkg npm install express --yes # install everything (audit-only CI)
# AI agent mode — structured JSON output
infynon pkg scan --agent # JSON scan: status/vulns/summary
infynon pkg npm install express --agent --strict high # JSON: installed/blocked/vulns
# Auto-fix all vulnerabilities
infynon pkg fix --auto
# Deep audit
infynon pkg audit
# Why is this package in my tree?
infynon pkg why lodash
# Health check
infynon pkg doctor
# Check for updates
infynon pkg outdated
# Compare versions
infynon pkg diff express 4.18.0 4.19.0
# Package size analysis
infynon pkg size express axios
# Remove unused deps
infynon pkg clean
# Migrate package managers
infynon pkg migrate pip uv
# Continuous monitoring
infynon pkg eagle-eye setup
infynon pkg eagle-eye start| Flag | Behavior | Exit Code |
|---|---|---|
--agent |
JSON output — recommended for all AI agent commands | 0/1/2/3 |
--strict [LEVEL] |
Block if vulnerabilities at/above level are found | 3 on block |
--auto-fix |
Upgrade to safe versions silently; skip if no fix | 0 |
--skip-vulnerable |
Skip vulnerable packages, install clean ones | 0 |
--yes |
Install all packages including vulnerable ones | 0 |
--agent exit codes: 0 = clean · 1 = warnings · 2 = vulnerable · 3 = blocked
npm, yarn, pnpm, bun, pip, uv, poetry, cargo, go, gem, composer, nuget, hex, pub
┌─────────────────────────────────────────────┐
│ Canonical Memory (Highest Trust) │
│ Architecture, API contracts, constraints │
│ Promoted only. Never auto-written. │
├─────────────────────────────────────────────┤
│ Team Memory (Medium Trust) │
│ Handoffs, caveats, PR notes, branch ctx │
│ Agent-writable. Compacted often. │
├─────────────────────────────────────────────┤
│ User Memory (Low Trust) │
│ Personal notes, observations, experiments │
│ Promotable to team. Never affects canon. │
└─────────────────────────────────────────────┘
# Initialize Trace
infynon trace init --repo my-project --owner team --user alien
# Add a backend
infynon trace source add-sql team-db \
--engine sqlite \
--url sqlite://.infynon/trace/trace.db \
--user alien --default
# Create notes
infynon trace note add arch-decision \
--title "Auth uses middleware" \
--body "All auth flows go through middleware" \
--layer canonical --scope repo
infynon trace note add handoff-payment \
--title "Payment webhook incomplete" \
--body "Stripe webhook handler needs idempotency testing" \
--layer team --scope branch --target feature/payment
# Retrieve memory
infynon trace retrieve --layer canonical
infynon trace retrieve --layer team --scope branch --target feature/payment
infynon trace retrieve --tag handoff
# Sync
infynon trace sync --direction both
# Compact stale notes
infynon trace compact
# TUI
infynon trace tuiSession start:
- Load canonical memory (always)
- Ask: "Load team memory?" → yes/no
- Optionally load user memory
- Pull from remote
Session end:
- Ask: "Any observations to save?"
- Mark stale notes
- Flag promotion candidates
- Compact and sync
- Never auto-write canonical
| Scope | Example |
|---|---|
repo |
Repository-wide architectural facts |
branch |
Branch-specific handoff context |
pr |
PR-linked notes for reviewers |
file |
File-specific caveats and warnings |
user |
User-scoped personal notes |
session |
Temporary session context (auto-compacted) |
package |
Dependency provenance and risk tracking |
User Memory → Team Memory → Canonical Memory
│ │ │
Low trust Medium trust High trust
Personal Shared Validated
Auto-write Agent-write Promote only
Promotion requires: merge + validation + review + repeated reuse without contradiction.
# Check installation
infynon --version
# Install via npm (recommended)
npm install -g infynon
# Or via script
curl -fsSL https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.sh | bash
# Windows
irm https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.ps1 | iex
# Verify
infynon --version/plugin # Check Errors tab
/reload-plugins # Reload all pluginsrm -rf ~/.claude/plugins/cache # Clear cache
# Restart Claude Code, reinstallcode-guardian/
├── .claude-plugin/
│ └── marketplace.json # Marketplace catalog
├── infynon-pkg/ # Package Security Manager plugin
│ ├── .claude-plugin/plugin.json
│ ├── agents/pkg-guardian.md # Package security agent
│ └── skills/
│ ├── package-security/ # Core package security skill
│ ├── cve-triage/ # CVE interpretation and prioritization
│ └── eagle-eye-monitor/ # Continuous vulnerability monitoring
├── infynon-weave/ # API Flow Testing plugin
│ ├── .claude-plugin/plugin.json
│ ├── agents/api-guardian.md # API testing agent
│ └── skills/
│ └── api-testing/ # Flow building, probes, TUI
├── infynon-trace/ # Shared Coding Memory plugin
│ ├── .claude-plugin/plugin.json
│ ├── agents/trace-guardian.md # Memory layer management agent
│ ├── hooks/
│ │ ├── session-start.md # Load canonical + ask team memory
│ │ ├── session-end.md # Capture observations, compact, sync
│ │ ├── settings-template.json # Hook config template for .claude/settings.json
│ │ └── install.sh # Script to install hooks into a project
│ └── skills/
│ ├── memory-ops/ # Core memory operations
│ │ └── examples/workflows.md
│ ├── canonical-memory/ # Canonical layer management
│ └── session-hooks/ # Session start/end workflows
└── README.md
MIT License