Analyze dependency, secret, filesystem, container, and IaC vulnerabilities, then turn the findings into triaged remediation work and CI/CD scanning guidance. Prefer `sec-risk-security-review` for design-time security review.
Analyze dependency, secret, filesystem, container, and IaC vulnerabilities, then turn the findings into triaged remediation work and CI/CD scanning guidance.
sec-static-code-analysis for that.docs/guidelines/shared-operating-policy.md#guideline-lookup.docs/guidelines/shared-operating-policy.md#story-maintenance for backlog, evidence, and follow-up updates tied to this skill.docs/guidelines/shared-operating-policy.md#completion-checklist as the default completion gate for this skill.pip-audit, or package-manager audit commands when they are appropriate to the detected stack.cve-triage-guide.md for decision framework.) Categorize as Confirmed Issue, Hotspot, False Positive, or Accepted Risk. For secrets, treat as urgent: rotate/revoke immediately, scan git history, and notify stakeholders. Create prioritized remediation storint assets.Dependency Scanning
Secret Scanning
Scan:
pip-audit -r requirements.txt, osv-scanner scan source -r ., gitleaks dir ., and trivy fs . --format json for structured results.Triage Example:
Found: CVE-2025-1000 (High) in requests library, v2.28.0.
Q1: Reachable? Yes (direct dependency, used in main service).
Q2: Exploitable? Yes (HTTP request input is user-controlled).
Q3: Patch available? Yes (v2.31.0 has fix).
Decision: P1. Create blocking story: "Upgrade requests to v2.31.0". Block release.
Found: Dev-only: CVE-2025-2000 (Medium) in pytest-mock.
Q1: Reachable in production? No (test-only).
Decision: P3. Add to suppression record with reason "dev-only", review in 90 days.
Scan:
npm audit, gitleaks, and trivy fs . to cover lockfiles, manifests, Docker assets, and secret patterns.syft . -o spdx-json > sbom.spdx.json.Secret Handling Example:
git log -p -- terraform/prod.tf | grep -i secret (check for exposure timeline).| Severity | Triage Category | Action | Timeline |
|---|---|---|---|
| Critical CVE, reachable, patch available | Confirmed Issue | Create P1 blocking story; fix before release | 24-48h |
| High CVE, transitive, patch requires major version | Hotspot | Evaluate upgrade burden; plan for next sprint if feasible | Current/next sprint |
| Medium CVE, not exploitable in context, documented | Mitigated | Record suppression with control evidence; accept risk | Document and move on |
| Low CVE, dev-only, no patch | Accepted Risk | Add to suppression record; review in 90 days | Backlog |
| Tool false alarm | False Positive | Document reason (tool error, not applicable); suppress | Document and move on |
| Exposed secret (any severity) | Confirmed Issue | Treat as urgent; rotate immediately | Within 1h; notify stakeholders |
See report.template.md for structured report format and cve-triage-guide.md for detailed decision framework
syft or Trivy's SBOM output.Triage Framework
report.template.md to structure output and ensure consistent triage categoripip-audit -r requirements.txt, osv-scanner scan source -r ., gitleaks dir ., and trivy fs ..npm audit, gitleaks, and trivy fs . to cover lockfiles, manifests, Docker assets, and secret patterns.run_vulnerability_analysis.pyscaffold_security_workflows.pyreport.template.mdThis skill is part of the automatic implementation feedback loop. Treat dependency, secret, container, and IaC findings as implementation feedback that should be triaged and, when safe, repaired immediately.