How to Evaluate Claude Tools

A practical framework for your team. Not legal advice — educational guidance you can adapt to your own security policies.

The 90-Second Check

Six questions before you go deeper. If any answer is a red flag, move on.

Who maintains it?
GitHub org or author profile
Anonymous or unidentifiable author
When was it last updated?
GitHub “pushed at” date
No commits in 6+ months
What license?
LICENSE file or GitHub sidebar
No license, or AGPL/GPL without legal review
How many dependencies?
package.json / requirements.txt
Hundreds of deps for a simple tool
Any known vulnerabilities?
npm audit or pip-audit
Critical or high severity CVEs
Does it have a security policy?
SECURITY.md in the repo
No way to report vulnerabilities

Going Deeper

For tools you plan to deploy in production or with client data:

Review what it accesses

Check the supply chain

Evaluate the maintainer

Test in isolation

Red Flags

Enterprise Considerations

Quick Reference

Audit npm dependenciesnpm audit
Audit Python dependenciespip-audit
Count dependenciesjq '.dependencies | length' package.json
Find outbound URLsgrep -rn 'https://' src/
Check for security policyLook for SECURITY.md in repo root

This guide is educational information, not legal advice or security certification. Organizations should consult their own security and legal teams before making deployment decisions.

Full Catalog · Getting Started · Trending · Deployment Playbook · Not Recommended · How We Review