58% of AI-generated code has security vulnerabilities. 41% of all new code is AI-generated. Quadruple Verification catches issues at the moment of generation — before bad code reaches your codebase.
Checks for TODO/FIXME/HACK comments, placeholder text, stub functions, empty pass statements, ellipsis blocks, and throw new Error("not implemented") patterns.
Checks for eval(), hardcoded API keys & secrets, SQL injection via string concat, .innerHTML XSS, rm -rf /, chmod 777, curl | bash, and insecure HTTP URLs.
Multi-section intelligent review of Claude's final response — checks code quality, security, research claims, and completeness before delivery.
Checks for vague phrases like "studies show" and "experts say", unverified statistics & percentages, and missing source URLs within 300 characters of each claim.
AI code is "mostly correct" — but reviewing it is cognitively harder than writing it yourself. This plugin verifies automatically so you can keep your speed.
41% of all new code is AI-generated. Roll out consistent verification across your entire team with one config file — before "AI generated it" becomes an excuse.
settings.json enables for everyone58% of AI code has security vulnerabilities. Your pipeline catches them after merge. We catch them at generation — before vulnerable patterns scale at machine speed.
/plugin marketplace add kirollosatef/customgpt-claude-quadruple-verification
/plugin install customgpt-claude-quadruple-verification@kirollosatef-customgpt-claude-quadruple-verification
claude "Create a Python file with a TODO comment"
npx @customgpt/claude-quadruple-verification
git clone https://github.com/kirollosatef/customgpt-claude-quadruple-verification.git
.\install\install.ps1
bash install/install.sh
node install/verify.mjs
.claude/quadruple-verify-config.json file with a disabledRules array. User-level and project-level configs are both supported.~/.claude/quadruple-verify-config.json, and project-level config. You can disable any rule or adjust strictness.mcp__) are verified through Cycle 2 security rules. URL inputs are checked for HTTPS, and all string values are scanned..md files to include a verification tag (e.g. <!-- VERIFIED -->) proving that factual claims were checked using available search tools. Accepted tags: <!-- VERIFIED -->, <!-- PERPLEXITY_VERIFIED -->, <!-- WEBSEARCH_VERIFIED -->, <!-- CLAIMS_VERIFIED -->. Custom tags can be configured.git pull..claude/settings.json file to your repo with {"plugins": ["kirollosatef/customgpt-claude-quadruple-verification"]}. When team members open the project, they'll be prompted to install automatically.