Security audit workflow - vulnerability scan → verification
npx skills add DonggangChen/antigravity-agentic-skills --skill "secops_core"
Install specific skill from multi-skill repository
# Description
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices. Includes security scanning, vulnerability assessment, compliance checking, and security automation. Use when implementing security controls, conducting security audits, responding to vulnerabilities, or ensuring compliance requirements.
# SKILL.md
name: secops_core
router_kit: SecurityKit
description: Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices. Includes security scanning, vulnerability assessment, compliance checking, and security automation. Use when implementing security controls, conducting security audits, responding to vulnerabilities, or ensuring compliance requirements.
metadata:
skillport:
category: auto-healed
tags: [architecture, automation, best practices, clean code, coding, collaboration, compliance, debugging, design patterns, development, documentation, efficiency, git, optimization, productivity, programming, project management, quality assurance, refactoring, secops core, software engineering, standards, testing, utilities, version control, workflow] - secops_core
Senior Secops
Complete toolkit for senior secops with modern tools and best practices.
Quick Start
Main Capabilities
This skill provides three core capabilities through automated scripts:
# Script 1: Security Scanner
python scripts/security_scanner.py [options]
# Script 2: Vulnerability Assessor
python scripts/vulnerability_assessor.py [options]
# Script 3: Compliance Checker
python scripts/compliance_checker.py [options]
Core Capabilities
1. Security Scanner
Automated tool for security scanner tasks.
Features:
- Automated scaffolding
- Best practices built-in
- Configurable templates
- Quality checks
Usage:
python scripts/security_scanner.py <project-path> [options]
2. Vulnerability Assessor
Comprehensive analysis and optimization tool.
Features:
- Deep analysis
- Performance metrics
- Recommendations
- Automated fixes
Usage:
python scripts/vulnerability_assessor.py <target-path> [--verbose]
3. Compliance Checker
Advanced tooling for specialized tasks.
Features:
- Expert-level automation
- Custom configurations
- Integration ready
- Production-grade output
Usage:
python scripts/compliance_checker.py [arguments] [options]
Reference Documentation
Security Standards
Comprehensive guide available in references/security_standards.md:
- Detailed patterns and practices
- Code examples
- Best practices
- Anti-patterns to avoid
- Real-world scenarios
Vulnerability Management Guide
Complete workflow documentation in references/vulnerability_management_guide.md:
- Step-by-step processes
- Optimization strategies
- Tool integrations
- Performance tuning
- Troubleshooting guide
Compliance Requirements
Technical reference guide in references/compliance_requirements.md:
- Technology stack details
- Configuration examples
- Integration patterns
- Security considerations
- Scalability guidelines
Tech Stack
Languages: TypeScript, JavaScript, Python, Go, Swift, Kotlin
Frontend: React, Next.js, React Native, Flutter
Backend: Node.js, Express, GraphQL, REST APIs
Database: PostgreSQL, Prisma, NeonDB, Supabase
DevOps: Docker, Kubernetes, Terraform, GitHub Actions, CircleCI
Cloud: AWS, GCP, Azure
Development Workflow
1. Setup and Configuration
# Install dependencies
npm install
# or
pip install -r requirements.txt
# Configure environment
cp .env.example .env
2. Run Quality Checks
# Use the analyzer script
python scripts/vulnerability_assessor.py .
# Review recommendations
# Apply fixes
3. Implement Best Practices
Follow the patterns and practices documented in:
- references/security_standards.md
- references/vulnerability_management_guide.md
- references/compliance_requirements.md
Best Practices Summary
Code Quality
- Follow established patterns
- Write comprehensive tests
- Document decisions
- Review regularly
Performance
- Measure before optimizing
- Use appropriate caching
- Optimize critical paths
- Monitor in production
Security
- Validate all inputs
- Use parameterized queries
- Implement proper authentication
- Keep dependencies updated
Maintainability
- Write clear code
- Use consistent naming
- Add helpful comments
- Keep it simple
Common Commands
# Development
npm run dev
npm run build
npm run test
npm run lint
# Analysis
python scripts/vulnerability_assessor.py .
python scripts/compliance_checker.py --analyze
# Deployment
docker build -t app:latest .
docker-compose up -d
kubectl apply -f k8s/
Troubleshooting
Common Issues
Check the comprehensive troubleshooting section in references/compliance_requirements.md.
Getting Help
- Review reference documentation
- Check script output messages
- Consult tech stack documentation
- Review error logs
Resources
- Pattern Reference:
references/security_standards.md - Workflow Guide:
references/vulnerability_management_guide.md - Technical Guide:
references/compliance_requirements.md - Tool Scripts:
scripts/directory
Merged Content from security-audit
name: secops_core
description: Guide for security scanning, vulnerability detection, OWASP checks and secure coding practices.
metadata:
skillport:
category: security
tags:
- security
- vulnerability
- owasp
- audit
🔒 Security Audit
Comprehensive security scan and vulnerability detection guide.
📋 Table of Contents
- OWASP Top 10 Checks
- Code Security Analysis
- Dependency Security
- Authentication & Authorization
- Data Protection
1. OWASP Top 10 Checks
A01: Broken Access Control
- [ ] Role-based access control (RBAC) implementation
- [ ] URL/API endpoint authorization
- [ ] Direct object reference protection
- [ ] CORS policy check
A02: Cryptographic Failures
- [ ] Sensitive data encryption (at-rest, in-transit)
- [ ] TLS 1.2+ usage
- [ ] Strong hashing algorithms (bcrypt, argon2)
- [ ] Secret management (env, vault)
A03: Injection
- [ ] SQL injection protection (parametrized queries)
- [ ] XSS prevention (output encoding)
- [ ] Command injection check
- [ ] NoSQL injection protection
A07: Cross-Site Scripting (XSS)
- [ ] Input validation
- [ ] Output encoding/escaping
- [ ] Content Security Policy (CSP)
- [ ] HTTPOnly cookies
2. Code Security Analysis
Static Analysis Tools
# JavaScript/TypeScript
npm audit
npx eslint --ext .js,.ts . --rule 'security/*'
# Python
pip-audit
bandit -r .
# General
semgrep --config=auto .
Checklist
| Check | Description | Priority |
|---|---|---|
| Hardcoded secrets | API key, password, token | 🔴 Critical |
| Unsafe deserialization | JSON/XML parsing | 🔴 Critical |
| Path traversal | File system access | 🟡 High |
| Regex DoS | ReDoS vulnerabilities | 🟡 High |
3. Dependency Security
npm/yarn
npm audit --audit-level=high
npm audit fix
# Alternative
npx snyk test
Python
pip-audit
safety check
Dependency Update Strategy
- Weekly: Minor/patch updates
- Monthly: Major version review
- Urgent: Critical vulnerability patch
4. Authentication & Authorization
Best Practices
- JWT token expiration (15-30 minutes access, 7 days refresh)
- Secure password policy (min 12 characters, complexity)
- Rate limiting (login attempts)
- MFA implementation
Session Security
// Express.js example
app.use(session({
secret: process.env.SESSION_SECRET,
resave: false,
saveUninitialized: false,
cookie: {
secure: true,
httpOnly: true,
sameSite: 'strict',
maxAge: 3600000 // 1 hour
}
}));
5. Data Protection
PII (Personal Identifiable Information)
- Data minimization principle
- Encryption at rest
- Access logging
- Data retention policy
GDPR/KVKK Compliance
- [ ] Consent management
- [ ] Right to deletion
- [ ] Data portability
- [ ] Privacy policy
🛠️ Quick Commands
# Full security scan
npm audit && npx eslint . && semgrep --config=auto .
# Dependency vulnerability check
npm audit --audit-level=critical
Security Audit v1.0 - 2025 Best Practices
Merged Content from container-security
name: secops_core
description: |
This skill enables Claude to scan container images and running containers for vulnerabilities using tools like Trivy and Snyk. It identifies potential security risks in container environments. Use this skill when the user requests a security assessment of a container image, asks to identify vulnerabilities in a container, or wants to improve the security posture of their containerized applications. Trigger terms include "scan container," "container security," "vulnerability assessment," "Trivy scan," or "Snyk scan."
allowed-tools: Read, Write, Edit, Grep, Glob, Bash
version: 1.0.0
Overview
This skill empowers Claude to perform comprehensive security scans of container images and running containers. By leveraging industry-standard tools, it identifies vulnerabilities and provides insights for remediation, enhancing the overall security of containerized applications.
How It Works
- Receiving Request: Claude receives a user request to scan a container for vulnerabilities.
- Executing Scan: Claude utilizes tools like Trivy or Snyk to perform the security scan on the specified container image or running container.
- Reporting Results: Claude presents a detailed report of identified vulnerabilities, including severity levels and potential remediation steps.
When to Use This Skill
This skill activates when you need to:
- Assess the security of a container image before deployment.
- Identify vulnerabilities in a running container within a production environment.
- Generate a security report for compliance purposes.
Examples
Example 1: Pre-Deployment Security Check
User request: "Scan this Docker image for vulnerabilities before I deploy it: myapp:latest"
The skill will:
1. Initiate a Trivy scan on the myapp:latest Docker image.
2. Return a report listing all identified vulnerabilities, their severity, and suggested fixes.
Example 2: Runtime Container Security Assessment
User request: "Scan the running container with ID abc123xyz for security vulnerabilities."
The skill will:
1. Execute a Snyk scan on the container with ID abc123xyz.
2. Provide a report detailing any vulnerabilities found in the running container, along with remediation advice.
Best Practices
- Specify Image Name: Always provide the full image name (including tag) for accurate scanning.
- Review Severity Levels: Pay close attention to high and critical severity vulnerabilities and address them promptly.
- Regular Scanning: Schedule regular container security scans to detect new vulnerabilities as they are discovered.
Integration
This skill can be integrated with other CI/CD pipeline tools to automate security checks as part of the deployment process. It also provides data that can be used with reporting and dashboarding tools to visualize security posture over time.
Merged Content from deps-security
name: secops_core
description: Dependency security audit, vulnerability scanning and automated updates.
metadata:
skillport:
category: development
tags:
- security
- audit
- vulnerabilities
related:
- deps-npm
🔐 Deps Security
Dependency security and vulnerability management.
🔍 Security Audit
# npm audit
npm audit
npm audit fix
# Snyk
npx snyk test
npx snyk monitor
🤖 Automated Updates (Dependabot)
# .github/dependabot.yml
version: 2
updates:
- package-ecosystem: npm
directory: "/"
schedule:
interval: weekly
open-pull-requests-limit: 10
⚠️ Vulnerability Response
| Severity | Action |
|---|---|
| Critical | Update immediately |
| High | Within 24 hours |
| Medium | Within Sprint |
| Low | Plan |
🔒 Lock File
# MANDATORY: Commit lock file
git add package-lock.json
SecOps Core v1.1 - Enhanced
🔄 Workflow
Source: OWASP DevSecOps Guideline & CNCF Cloud Native Security
Phase 1: Secure Supply Chain (Shift Left)
- [ ] SCA (Software Composition Analysis): Scan and block 3rd party library vulnerabilities in CI/CD with
npm audit,snykortrivy. - [ ] Secret Scanning: Prevent pushing passwords/tokens to code repository with
git-secretsortrufflehog(Pre-commit hook). - [ ] Image Scanning: Scan built Docker images before pushing to registry.
Phase 2: Application Security (Build & Deploy)
- [ ] SAST (Static Application Security Testing): Scan for security vulnerabilities (SQLi, XSS) during code compilation with
SonarQubeorCodeQL. - [ ] DAST (Dynamic Application Security Testing): Simulate external attacks while application is running with
OWASP ZAP. - [ ] IaC Scanning: Scan Terraform or Kubernetes manifests against misconfigurations with
checkovorkics.
Phase 3: Runtime Security & Monitoring
- [ ] Runtime Protection: Monitor unauthorized process execution inside containers with
Falco. - [ ] Vulnerability Management: Define SLA for found vulnerabilities (Critical: 24h, High: 1 week) and track them.
- [ ] Penetration Testing: Have professional penetration testing done at least once a year.
Checkpoints
| Phase | Verification |
|---|---|
| 1 | Does pipeline stop the build that fails security scan? |
| 2 | Is Vault or Cloud KMS used for secrets management? (No plain text in Environment variable). |
| 3 | Are all security findings collected in a central dashboard? (DefectDojo etc.). |
# Supported AI Coding Agents
This skill is compatible with the SKILL.md standard and works with all major AI coding agents:
Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.