Skip to main content
    Canary · Claude Code Plugin

    INSTALLATION GUIDE

    Install Canary in two commands

    Canary hooks into every Claude Code session and silently tracks PII exposure. No configuration. No API keys. Just paste two commands and you're done.

    01

    Open any Claude Code session

    Canary installs directly from within Claude Code. No external downloads or package managers needed.

    02

    Add the plugin from the marketplace

    /plugin marketplace add sonomos-ai/Canary-Plugin

    This registers the Canary plugin source from the Sonomos GitHub org. It doesn't install it yet.

    03

    Install the plugin

    /plugin install canary@sonomos

    This installs Canary and registers it as a stop hook — it'll run automatically after every message from this point on.

    04

    Verify it's running

    /canary:leaked

    Opens an interactive HTML dashboard showing everything Canary has detected so far. On a fresh install, it'll show zero — but the counter starts climbing immediately.

    Quick reference

    /plugin marketplace add sonomos-ai/Canary-PluginRegister plugin source
    /plugin install canary@sonomosInstall Canary
    /canary:leakedOpen PII dashboard
    /canary:export csvExport as CSV
    /canary:export jsonExport as JSON

    No API keys, external services, or network access required.

    Canary runs asynchronously — it never pauses or slows your session.

    Findings are stored only in ~/.sonomos/leaks.jsonl with owner-only file permissions.

    Canary tracks exposure — it doesn't prevent it. For active prevention, see Sonomos Desktop.