调试
Source-Sink Security Analysis
Performs comprehensive security-focused source-sink data flow analysis on codebases. Traces every untrusted input (user input, API payloads, LLM tool args, file metadata, external API responses) through transformations and validations to sensitive execution sinks (shell execution, prompt assembly, subprocess calls, SQL/query construction, template rendering, file writes, log output). Produces a structured markdown report with mermaid diagrams, vulnerability matrix, and remediation priorities. Use this skill whenever the user asks for source-sink analysis, data flow analysis, untrusted input analysis, injection analysis, attack surface mapping, threat modeling, security audit, taint analysis, or wants to understand how untrusted data flows through their codebase. Also trigger when users say things like 'where does user input end up', 'find injection vulnerabilities', 'trace data flows', 'what's the attack surface', 'security review this code', or 'how is input validated'.