Audits code for common vulnerabilities: injection, secrets, auth, and dependency CVEs. Use when reviewing security, before release, or when the user asks for a security check.
Review code and config for common security issues so risks are identified and remediated.
execute(f"...")-style code.exec, system, eval, or shell commands. Use allowlists and parameterized execution.innerHTML or raw HTML with user input.Example (bad vs good):
# BAD
cursor.execute(f"SELECT * FROM users WHERE id = {user_id}")
# GOOD
cursor.execute("SELECT * FROM users WHERE id = %s", (user_id,))
GET /orders/123 must check that order 123 belongs to the authenticated user.npm audit, pip audit, go list -m all with a CVE DB). Address critical/high; document or accept risk for others with justification.For each finding:
**[file:line or area]** [Short title]
- **Issue:** [What is wrong.]
- **Impact:** [What an attacker could do or what risk.]
- **Recommendation:** [Concrete fix or mitigation.]
- **Severity:** Critical | High | Medium | Low
Summary: "Reviewed: [scope]. Findings: X Critical, Y High, Z Medium. No obvious issues in [other areas]." Suggest next steps (e.g. dependency scan, pentest) if appropriate.