Action skill that performs security analysis on a specified target (files, project, or staged changes). Identifies vulnerabilities, hardcoded secrets, injection risks, and unsafe patterns. Uses the 'security-audit' knowledge skill for OWASP methodology. Trigger phrases: "/security", "check security", "security scan", "is this secure", "security check".
This skill performs on-demand security scanning and vulnerability analysis. It identifies common security risks including hardcoded secrets, SQL injection patterns, unsafe code execution, and insecure DOM manipulation.
/securitycheck securitysecurity scanis this securesecurity checkIdentify what to scan:
Reference the security-audit skill for comprehensive audit methodology and detailed vulnerability classification.
Search for common secret patterns:
API_KEY, api_key, APIKEYPASSWORD, password, passwdTOKEN, token, SECRET, secretAKIA, aws_secret_access_keyPRIVATE_KEY, private_key, -----BEGINIdentify string concatenation with user input in SQL queries:
query = "SELECT ... " + user_inputf"SELECT ... {variable}"query.format(user_input)Find unsafe code execution patterns:
eval() on user-controlled inputexec() on user-controlled inputsubprocess.call() with shell=True and user inputos.system() with user inputIdentify insecure DOM operations:
innerHTML assignment without sanitizationdangerouslySetInnerHTML in React without sanitizationdocument.write() with user inputCRITICAL
HIGH
MEDIUM
LOW
CLEAN
Output format:
SECURITY SCAN REPORT
====================
Target: [file/directory/staged changes]
Scan Date: [timestamp]
OVERALL RISK LEVEL: [CRITICAL|HIGH|MEDIUM|LOW|CLEAN]
FINDINGS BY SEVERITY
====================
[CRITICAL] (count)
- [Finding 1]: [File:Line] - [Description]
- [Finding 2]: [File:Line] - [Description]
[HIGH] (count)
- [Finding 1]: [File:Line] - [Description]
[MEDIUM] (count)
- [Finding 1]: [File:Line] - [Description]
[LOW] (count)
- [Finding 1]: [File:Line] - [Description]
EXECUTIVE SUMMARY
=================
[1-2 sentence summary of overall security posture]
TOP RECOMMENDATIONS
===================
1. [Priority 1 action]
2. [Priority 2 action]
3. [Priority 3 action]
SCAN STATISTICS
===============
Files Scanned: [count]
Total Findings: [count]
Scan Duration: [time]
security-audit: Comprehensive security audit methodology and detailed vulnerability analysis