Skip to content

Commit c979929

Browse files
0xbeekeeperclaude
andcommitted
chore: rebrand to GoPlus AgentGuard across all user-facing text
Update brand name from "AgentGuard" to "GoPlus AgentGuard" in all user-facing locations: README, SKILL.md, setup.sh, hooks status messages, guard-hook error messages, CLI comments, MCP server log, package.json description, examples, evals, and CONTRIBUTING.md. Code identifiers (package name, function names, CLI commands) remain as `agentguard`/`createAgentGuard` for developer ergonomics. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
1 parent 8b0f689 commit c979929

16 files changed

Lines changed: 50 additions & 50 deletions

File tree

CLAUDE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# AgentGuard
1+
# GoPlus AgentGuard
22

33
Security framework for AI agents. Provides code scanning, runtime action evaluation, and trust management.
44

CONTRIBUTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# Contributing to AgentGuard
1+
# Contributing to GoPlus AgentGuard
22

3-
Thanks for your interest in contributing to AgentGuard! Here's how to get started.
3+
Thanks for your interest in contributing to GoPlus AgentGuard! Here's how to get started.
44

55
## Development Setup
66

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# AgentGuard
1+
# GoPlus AgentGuard
22

33
**Security guard for your AI agent.** Automatically blocks dangerous commands, prevents data leaks, and protects your secrets.
44

5-
Your AI agent can execute `rm -rf /`, read your SSH keys, and send passwords to Discord. AgentGuard stops all of that.
5+
Your AI agent can execute `rm -rf /`, read your SSH keys, and send passwords to Discord. GoPlus AgentGuard stops all of that.
66

77
[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg)](LICENSE)
88
[![Node.js](https://img.shields.io/badge/node-%3E%3D18-green.svg)](https://nodejs.org)
@@ -11,9 +11,9 @@ Your AI agent can execute `rm -rf /`, read your SSH keys, and send passwords to
1111

1212
## What It Does
1313

14-
AgentGuard protects your AI coding agent with two layers:
14+
GoPlus AgentGuard protects your AI coding agent with two layers:
1515

16-
**Layer 1 — Automatic Guard (hooks)**: Install once, forget about it. AgentGuard intercepts dangerous tool calls in real time:
16+
**Layer 1 — Automatic Guard (hooks)**: Install once, forget about it. GoPlus AgentGuard intercepts dangerous tool calls in real time:
1717
- Blocks `rm -rf /`, fork bombs, `curl | bash` and other destructive commands
1818
- Prevents writes to `.env`, `.ssh/`, credentials files
1919
- Detects data exfiltration to Discord/Telegram/Slack webhooks
@@ -27,7 +27,7 @@ AgentGuard protects your AI coding agent with two layers:
2727

2828
## Compatibility
2929

30-
AgentGuard follows the [Agent Skills](https://agentskills.io) open standard and works with:
30+
GoPlus AgentGuard follows the [Agent Skills](https://agentskills.io) open standard and works with:
3131

3232
| Platform | Support |
3333
|----------|---------|
@@ -51,7 +51,7 @@ cd agentguard && ./setup.sh
5151

5252
This installs the skill, builds the project, and configures your protection level.
5353

54-
To enable automatic hook protection, add AgentGuard as a Claude Code plugin:
54+
To enable automatic hook protection, add GoPlus AgentGuard as a Claude Code plugin:
5555

5656
```bash
5757
claude plugin add /path/to/agentguard
@@ -194,7 +194,7 @@ Get keys at: https://gopluslabs.io/security-api
194194

195195
### External Scanner
196196

197-
AgentGuard integrates with [cisco-ai-defense/skill-scanner](https://github.com/cisco-ai-defense/skill-scanner) for YAML/YARA patterns, Python AST analysis, and VirusTotal integration:
197+
GoPlus AgentGuard integrates with [cisco-ai-defense/skill-scanner](https://github.com/cisco-ai-defense/skill-scanner) for YAML/YARA patterns, Python AST analysis, and VirusTotal integration:
198198

199199
```bash
200200
pip install cisco-ai-skill-scanner
@@ -239,4 +239,4 @@ npm install && npm run build && npm test
239239

240240
Contributions welcome! See [CONTRIBUTING.md](CONTRIBUTING.md) for guidelines.
241241

242-
Built by [GoPlusSecurity](https://github.com/GoPlusSecurity).
242+
Built by [GoPlus Security](https://gopluslabs.io).

examples/vulnerable-skill/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Vulnerable Skill Demo
22

3-
This directory contains intentionally vulnerable code for testing AgentGuard security scanning.
3+
This directory contains intentionally vulnerable code for testing GoPlus AgentGuard security scanning.
44

55
**DO NOT use any code from this directory in production.**
66

@@ -10,7 +10,7 @@ This directory contains intentionally vulnerable code for testing AgentGuard sec
1010
/agentguard scan examples/vulnerable-skill
1111
```
1212

13-
## What AgentGuard Should Detect
13+
## What GoPlus AgentGuard Should Detect
1414

1515
### JavaScript (`malicious-helper.js`)
1616
- `SHELL_EXEC` — child_process exec

examples/vulnerable-skill/malicious-contract.sol

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ pragma solidity ^0.8.0;
55
* DEMO: Vulnerable Smart Contract
66
*
77
* This contract contains intentionally vulnerable patterns
8-
* for demonstrating AgentGuard' Web3 security scanning.
8+
* for demonstrating GoPlus AgentGuard's Web3 security scanning.
99
*
1010
* DO NOT deploy this contract. Every pattern here is a security risk.
1111
*

examples/vulnerable-skill/malicious-helper.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
* DEMO: Vulnerable Skill Example
33
*
44
* This file contains intentionally vulnerable code patterns
5-
* for demonstrating AgentGuard' security scanning capabilities.
5+
* for demonstrating GoPlus AgentGuard's security scanning capabilities.
66
*
77
* DO NOT use this code in production. Every pattern here is a
8-
* security risk that AgentGuard should detect.
8+
* security risk that GoPlus AgentGuard should detect.
99
*
1010
* Run: /agentguard scan examples/vulnerable-skill
1111
*/

hooks/hooks.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"type": "command",
99
"command": "node \"${CLAUDE_PLUGIN_ROOT}/skills/agentguard/scripts/guard-hook.js\"",
1010
"timeout": 10,
11-
"statusMessage": "AgentGuard: checking command safety..."
11+
"statusMessage": "GoPlus AgentGuard: checking command safety..."
1212
}
1313
]
1414
},
@@ -19,7 +19,7 @@
1919
"type": "command",
2020
"command": "node \"${CLAUDE_PLUGIN_ROOT}/skills/agentguard/scripts/guard-hook.js\"",
2121
"timeout": 10,
22-
"statusMessage": "AgentGuard: checking file write safety..."
22+
"statusMessage": "GoPlus AgentGuard: checking file write safety..."
2323
}
2424
]
2525
},
@@ -30,7 +30,7 @@
3030
"type": "command",
3131
"command": "node \"${CLAUDE_PLUGIN_ROOT}/skills/agentguard/scripts/guard-hook.js\"",
3232
"timeout": 10,
33-
"statusMessage": "AgentGuard: checking network request..."
33+
"statusMessage": "GoPlus AgentGuard: checking network request..."
3434
}
3535
]
3636
}

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "agentguard",
33
"version": "1.0.0",
4-
"description": "Security guard for AI agents. Blocks dangerous commands, prevents data leaks, protects secrets. 20 detection rules, runtime action evaluation, trust registry.",
4+
"description": "GoPlus AgentGuard — Security guard for AI agents. Blocks dangerous commands, prevents data leaks, protects secrets. 20 detection rules, runtime action evaluation, trust registry.",
55
"main": "dist/index.js",
66
"types": "dist/index.d.ts",
77
"bin": {

setup.sh

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
#!/usr/bin/env bash
22
set -euo pipefail
33

4-
# AgentGuard — One-click setup
5-
# Installs AgentGuard as a Claude Code skill with automatic security hooks.
4+
# GoPlus AgentGuard — One-click setup
5+
# Installs GoPlus AgentGuard as a Claude Code skill with automatic security hooks.
66

77
SCRIPT_DIR="$(cd "$(dirname "$0")" && pwd)"
88
AGENTGUARD_DIR="$HOME/.agentguard"
@@ -11,22 +11,22 @@ SKILLS_DIR="$CLAUDE_DIR/skills/agentguard"
1111
MIN_NODE_VERSION=18
1212

1313
echo ""
14-
echo " AgentGuard — AI Agent Security Guard"
15-
echo " ======================================"
14+
echo " GoPlus AgentGuard — AI Agent Security Guard"
15+
echo " ============================================="
1616
echo ""
1717

1818
# ---- Pre-check: Node.js ----
1919
if ! command -v node &>/dev/null; then
2020
echo " ERROR: Node.js is not installed."
21-
echo " AgentGuard requires Node.js >= $MIN_NODE_VERSION."
21+
echo " GoPlus AgentGuard requires Node.js >= $MIN_NODE_VERSION."
2222
echo " Install from: https://nodejs.org"
2323
exit 1
2424
fi
2525

2626
NODE_MAJOR=$(node -e "console.log(process.versions.node.split('.')[0])")
2727
if [ "$NODE_MAJOR" -lt "$MIN_NODE_VERSION" ]; then
2828
echo " ERROR: Node.js v$(node -v) is too old."
29-
echo " AgentGuard requires Node.js >= $MIN_NODE_VERSION."
29+
echo " GoPlus AgentGuard requires Node.js >= $MIN_NODE_VERSION."
3030
echo " Install from: https://nodejs.org"
3131
exit 1
3232
fi
@@ -38,19 +38,19 @@ fi
3838

3939
# ---- Uninstall mode ----
4040
if [ "${1:-}" = "--uninstall" ] || [ "${1:-}" = "uninstall" ]; then
41-
echo " Uninstalling AgentGuard..."
41+
echo " Uninstalling GoPlus AgentGuard..."
4242
rm -rf "$SKILLS_DIR" 2>/dev/null && echo " Removed skill from $SKILLS_DIR" || true
4343
rm -rf "$AGENTGUARD_DIR" 2>/dev/null && echo " Removed config from $AGENTGUARD_DIR" || true
4444
echo ""
45-
echo " AgentGuard has been uninstalled."
45+
echo " GoPlus AgentGuard has been uninstalled."
4646
echo " If you added it as a Claude Code plugin, also run:"
4747
echo " claude plugin remove agentguard"
4848
echo ""
4949
exit 0
5050
fi
5151

5252
# ---- Step 1: Build the project ----
53-
echo "[1/4] Building AgentGuard..."
53+
echo "[1/4] Building GoPlus AgentGuard..."
5454
if [ -f "$SCRIPT_DIR/package.json" ]; then
5555
cd "$SCRIPT_DIR"
5656
npm install --ignore-scripts 2>/dev/null
@@ -93,7 +93,7 @@ fi
9393
echo ""
9494
echo " Setup complete!"
9595
echo ""
96-
echo " Your AI agent is now protected by AgentGuard."
96+
echo " Your AI agent is now protected by GoPlus AgentGuard."
9797
echo ""
9898
echo " Usage:"
9999
echo " /agentguard scan <path> Scan code for security risks"

skills/agentguard/SKILL.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
name: agentguard
3-
description: AI agent security guard. Automatically blocks dangerous commands, prevents data leaks, and protects secrets. Use when reviewing third-party code, auditing skills, checking for vulnerabilities, evaluating action safety, or viewing security logs.
3+
description: GoPlus AgentGuard — AI agent security guard. Automatically blocks dangerous commands, prevents data leaks, and protects secrets. Use when reviewing third-party code, auditing skills, checking for vulnerabilities, evaluating action safety, or viewing security logs.
44
user-invocable: true
55
allowed-tools: Read, Grep, Glob, Bash(node *)
66
argument-hint: [scan|action|trust|report|config] [args...]
77
---
88

9-
# AgentGuard — AI Agent Security Framework
9+
# GoPlus AgentGuard — AI Agent Security Framework
1010

11-
You are a security auditor powered by the AgentGuard framework. Route the user's request based on the first argument.
11+
You are a security auditor powered by the GoPlus AgentGuard framework. Route the user's request based on the first argument.
1212

1313
## Command Routing
1414

@@ -72,7 +72,7 @@ For each rule, use Grep to search the relevant file types. Record every match wi
7272
### Output Format
7373

7474
```
75-
## AgentGuard Security Scan Report
75+
## GoPlus AgentGuard Security Scan Report
7676
7777
**Target**: <scanned path>
7878
**Risk Level**: CRITICAL | HIGH | MEDIUM | LOW
@@ -186,7 +186,7 @@ Always combine script results with the policy-based checks (webhook domains, sec
186186
### Output Format
187187

188188
```
189-
## AgentGuard Action Evaluation
189+
## GoPlus AgentGuard Action Evaluation
190190
191191
**Action**: <action type and description>
192192
**Decision**: ALLOW | DENY | CONFIRM
@@ -204,7 +204,7 @@ Always combine script results with the policy-based checks (webhook domains, sec
204204

205205
## Subcommand: trust
206206

207-
Manage skill trust levels using the AgentGuard registry.
207+
Manage skill trust levels using the GoPlus AgentGuard registry.
208208

209209
### Trust Levels
210210

@@ -262,7 +262,7 @@ If scripts are not available, help the user inspect `data/registry.json` directl
262262

263263
## Subcommand: report
264264

265-
Display recent security events from the AgentGuard audit log.
265+
Display recent security events from the GoPlus AgentGuard audit log.
266266

267267
### Log Location
268268

@@ -281,7 +281,7 @@ The audit log is stored at `~/.agentguard/audit.jsonl`. Each line is a JSON obje
281281
### Output Format
282282

283283
```
284-
## AgentGuard Security Report
284+
## GoPlus AgentGuard Security Report
285285
286286
**Events**: <total count>
287287
**Blocked**: <deny count>
@@ -304,7 +304,7 @@ If the log file doesn't exist, inform the user that no security events have been
304304

305305
## Subcommand: config
306306

307-
Set the AgentGuard protection level.
307+
Set the GoPlus AgentGuard protection level.
308308

309309
### Protection Levels
310310

0 commit comments

Comments
 (0)