Security audit workflow - vulnerability scan β verification
npx skills add parcadei/Continuous-Claude-v3 --skill "security"
Install specific skill from multi-skill repository
# Description
Security audit workflow - vulnerability scan β verification
# SKILL.md
name: security
description: Security audit workflow - vulnerability scan β verification
/security - Security Audit Workflow
Dedicated security analysis for sensitive code.
When to Use
- "Security audit"
- "Check for vulnerabilities"
- "Is this secure?"
- "Review authentication code"
- "Check for injection attacks"
- Before handling auth, payments, user data
- After adding security-sensitive features
Workflow Overview
βββββββββββ βββββββββββββ
β aegis βββββΆβ arbiter β
β β β β
βββββββββββ βββββββββββββ
Security Verify
audit fixes
Agent Sequence
| # | Agent | Role | Output |
|---|---|---|---|
| 1 | aegis | Comprehensive security scan | Vulnerability report |
| 2 | arbiter | Verify fixes, run security tests | Verification report |
Why Dedicated Security?
The /review workflow focuses on code quality. Security needs:
- Specialized vulnerability patterns
- Dependency scanning
- Secret detection
- OWASP Top 10 checks
- Authentication/authorization review
Execution
Phase 1: Security Audit
Task(
subagent_type="aegis",
prompt="""
Security audit: [SCOPE]
Scan for:
**Injection Attacks:**
- SQL injection
- Command injection
- XSS (Cross-Site Scripting)
- LDAP injection
**Authentication/Authorization:**
- Broken authentication
- Session management issues
- Privilege escalation
- Insecure direct object references
**Data Protection:**
- Sensitive data exposure
- Hardcoded secrets/credentials
- Insecure cryptography
- Missing encryption
**Configuration:**
- Security misconfigurations
- Default credentials
- Verbose error messages
- Missing security headers
**Dependencies:**
- Known vulnerable packages
- Outdated dependencies
- Supply chain risks
Output: Detailed report with:
- Severity (CRITICAL/HIGH/MEDIUM/LOW)
- Location (file:line)
- Description
- Remediation steps
"""
)
Phase 2: Verification (After Fixes)
Task(
subagent_type="arbiter",
prompt="""
Verify security fixes: [SCOPE]
Run:
- Security-focused tests
- Dependency audit (npm audit, pip audit)
- Re-check reported vulnerabilities
- Verify fixes don't introduce regressions
Output: Verification report
"""
)
Security Scopes
Full Codebase
User: /security
β Scan entire codebase
Specific Area
User: /security authentication
β Focus on auth-related code
Single File
User: /security src/api/auth.py
β Deep dive on one file
Dependencies Only
User: /security --deps
β Only dependency vulnerabilities
Example
User: /security the payment processing code
Claude: Starting /security audit for payment code...
Phase 1: Security audit...
[Spawns aegis]
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Security Audit Report β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Scope: src/services/payment/ β
β Files scanned: 12 β
β Lines analyzed: 2,847 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β CRITICAL (1) β
β ββββββββββ β
β [C1] SQL Injection in payment.py:89 β
β query = f"SELECT * FROM orders WHERE id = {order_id}" β
β Fix: Use parameterized queries β
β β
β HIGH (2) β
β ββββββββ β
β [H1] Hardcoded API key in stripe_client.py:12 β
β STRIPE_KEY = "sk_live_..." β
β Fix: Move to environment variable β
β β
β [H2] Missing input validation in refund.py:45 β
β amount = request.json['amount'] # No validation β
β Fix: Validate amount is positive number β
β β
β MEDIUM (1) β
β ββββββββββ β
β [M1] Verbose error messages in error_handler.py:23 β
β return {"error": str(e)} # Leaks internal details β
β Fix: Return generic message, log details internally β
β β
β LOW (0) β
β βββββββ β
β None β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Summary: 1 critical, 2 high, 1 medium, 0 low β
β Status: BLOCKING - Fix critical issues before release β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Fix the critical and high issues, then run:
/security --verify
After Fixes
User: /security --verify
Claude: Phase 2: Verifying fixes...
[Spawns arbiter]
β
C1: SQL injection fixed - using parameterized queries
β
H1: API key moved to environment variable
β
H2: Input validation added
β
M1: Error messages sanitized
All security tests passing.
Security audit: PASSED
OWASP Top 10 Coverage
| Risk | Checked |
|---|---|
| A01 Broken Access Control | β |
| A02 Cryptographic Failures | β |
| A03 Injection | β |
| A04 Insecure Design | β |
| A05 Security Misconfiguration | β |
| A06 Vulnerable Components | β |
| A07 Auth Failures | β |
| A08 Data Integrity Failures | β |
| A09 Logging Failures | β |
| A10 SSRF | β |
Flags
--deps: Dependencies only--verify: Re-run after fixes--owasp: Explicit OWASP Top 10 report--secrets: Focus on secret detection
# Supported AI Coding Agents
This skill is compatible with the SKILL.md standard and works with all major AI coding agents:
Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.