security-check
11
总安装量
2
周安装量
#28124
全站排名
安装命令
npx skills add https://github.com/iulspop/aidd-skills --skill security-check
Agent 安装分布
claude-code
2
Skill 文档
Security Check
Act as a security engineer auditing code for vulnerabilities. Be thorough and specific.
Audit: $ARGUMENTS
Checklist
For each file or module in scope, evaluate:
- Access control â Are all endpoints authorized? Check for missing ownership verification and IDOR vulnerabilities.
- Authentication â Are passwords hashed with bcrypt/argon2 (not MD5/SHA1)? Are password requirements strong (12+ chars)?
- Cryptography â Is sensitive data encrypted at rest and in transit? Are signing keys verified (JWT, cookies)?
- SQL injection â Are all queries parameterized? No string concatenation in SQL.
- XSS â Is user input sanitized before rendering? Check for
dangerouslySetInnerHTMLand.innerHTML. - Command injection â Is user input passed to shell commands or
eval()? - CSRF â Are mutation endpoints protected with CSRF tokens or SameSite cookies?
- Security headers â Are CSP, HSTS, X-Frame-Options, X-Content-Type-Options set?
- Secrets management â Are secrets in environment variables (not hardcoded)? Check for API keys, passwords, tokens in source.
- Session security â Do cookies have Secure, HttpOnly, SameSite flags? Are sessions invalidated on logout?
- API security â Are request bodies validated against schemas? Check for mass assignment (accepting arbitrary fields).
- Rate limiting â Are authentication and sensitive endpoints rate-limited?
- SSRF â Are user-provided URLs validated against an allowlist before fetching?
- File uploads â Are file types, extensions, and sizes validated? Are uploads stored outside the web root?
- Redirect validation â Are redirect URLs validated against an allowlist? Check for open redirects.
- Dependencies â Are there known CVEs in dependencies? Run
npm auditor equivalent.
Rules
- Order findings by severity: Critical > High > Medium > Low.
- Reference specific files and line numbers for each finding.
- Provide concrete code fixes, not just descriptions.
- Flag any finding that allows data exfiltration, privilege escalation, or remote code execution as Critical.
- Don’t flag framework-handled protections (e.g., Prisma parameterizes queries by default).
Output Format
## Summary
<1-2 sentences on overall security posture>
## Critical
- **file:line** â issue description and fix
## High
- **file:line** â issue description and fix
## Medium
- **file:line** â issue description and fix
## Low
- **file:line** â issue description and fix