Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.
claude-code-showcase
A comprehensive plugin that provides Claude with code project configuration examples including auto-formatting hooks, testing setup, React UI patterns, code review agents, and GitHub Actions workflows.
66
/ 100 · Grade D
D = 60–69
“I need to set up a complete development project with automated formatting, testing, UI patterns, code review processes, and CI/CD workflows using best practices and proven configurations.”
claude-code-showcase earned Certified status with a trust score of 66/100 (Grade D). No adversarial findings — all attack patterns were handled gracefully. Supply chain is clean — 10 components with no known vulnerabilities. Security scan flagged 0 findings.
Trust Score Breakdown
Eight weighted signals composing the aggregate trust score
Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.
Findings
Security scan results, adversarial testing, and pipeline review
Security Scan — Cisco Skill Scanner
Adversarial Testing — 6 categories, 0 findings
No adversarial findings — all attack patterns handled gracefully.
Methodology v1.0 · 6 categories · ~55 attack patterns
Supply Chain
SBOM analysis and vulnerability assessment
Components
10
Direct deps
0
Transitive deps
10
Total vulns
0
Format: CycloneDX 1.5 · Generated: Mar 28, 2026
Behavioral Fingerprint
Runtime performance baseline for drift detection
Samples
8
Error rate
0.0%
Peak memory
— MB
Avg CPU
—%
Response time distribution
Output size distribution
Fingerprint v1.0 · Baseline: Mar 28, 2026 · Status: baseline
Component Inventory
28 components composing this plugin
skills
7
agents
2
commands
6
hooks
3
scripts
2
skills (7)
agents (2)
commands (6)
hooks (3)
scripts (2)
Interface
Aggregated instruction summary
Scope & Permissions
What this capability can and cannot access — derived from pipeline analysis
yes
no
yes
yes
yes
yes
Badge & Integration
Embed certification status in your README, docs, or CI pipeline
Certification Notes
Provenance observations from the pipeline
Publisher "ChrisWiles" is not verified — first certification from this publisher
No license file found in repository
No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process
Single contributor — no peer review evidence in commit history
Package description appears to be boilerplate or template text
Signed Artifact
Certification provenance and verification metadata
The original instruction file with a certification footer appended. Replace the source file in your project so AI agents see the trust score, verification link, and SOP.
ES256-signed JWS artifact for programmatic verification. Use with the Fidensa MCP server or GitHub Action to validate integrity.
Pipeline Artifacts
Raw data files from this certification run — downloadable for independent verification
contract.json
Full unsigned contract
stage1-ingest.json
Ingest stage output
stage2a-sbom.json
SBOM generation results
stage2a-vulns.json
Vulnerability scan results
stage2b-security.json
Security scan results
stage3a-functional.json
Functional test results
stage3b-adversarial.json
Adversarial test results
stage3c-fingerprint.json
Behavioral fingerprint
stage4-certify.json
Certification decision + trust score
stage3a-measurements.json
Raw functional test measurements
stage3b-measurements.json
Raw adversarial test measurements
run-log.json
Pipeline execution log
Not all files may be present for every certification.