general-frontend-security

📁 lennetech/claude-code 📅 6 days ago
1
总安装量
1
周安装量
#42793
全站排名
安装命令
npx skills add https://github.com/lennetech/claude-code --skill general-frontend-security

Agent 安装分布

amp 1
opencode 1
cursor 1
kimi-cli 1
codex 1
github-copilot 1

Skill 文档

General Frontend Security

Framework-agnostic security practices for web applications based on OWASP guidelines.

When to Use This Skill

  • Reviewing frontend code for security vulnerabilities
  • Implementing client-side authentication flows
  • Setting up secure cookie handling
  • Configuring Content Security Policy
  • Auditing third-party dependencies
  • General frontend security questions

Skill Boundaries

User Intent Correct Skill
“XSS prevention best practices” THIS SKILL
“Security audit of frontend” THIS SKILL
“Configure CSP headers” THIS SKILL
“Build a secure login page in Nuxt” developing-lt-frontend
“Fix @Restricted decorator in NestJS” generating-nest-servers
“Run npm audit fix” maintaining-npm-packages

Framework-Specific References

Framework Reference File
Nuxt/Vue ../developing-lt-frontend/reference/security.md
Angular angular-security.md

Key Principles

  1. Never trust client-side validation – Server must always verify
  2. Store tokens securely – Memory for access tokens, httpOnly cookies for refresh tokens
  3. Prevent XSS – Never use innerHTML with user input; use textContent or DOMPurify
  4. Protect against CSRF – Use CSRF tokens for state-changing requests + SameSite cookies
  5. Configure CSP – Restrict script/style sources, use nonces, block framing
  6. Minimize dependencies – Fewer deps = smaller attack surface; always run npm audit

Complete OWASP reference with code examples: owasp-reference.md

Security Checklist

Development

  • No sensitive data in client-side code
  • Environment variables separated (public vs private)
  • Input validation on all user inputs
  • XSS prevention (no innerHTML with user data)
  • CSRF tokens for state-changing requests

Authentication

  • Tokens stored securely (memory + httpOnly cookies)
  • Token refresh mechanism implemented
  • Proper logout (clear all client state)
  • Session timeout configured

Configuration

  • HTTPS enforced
  • CSP headers configured
  • Security headers set (X-Frame-Options, etc.)
  • Cookies configured with secure flags
  • CORS properly restricted

Dependencies

  • npm audit clean (or accepted risks)
  • package-lock.json committed
  • SRI for external resources
  • Regular dependency updates

Build & Deploy

  • Debug mode disabled
  • Console logs removed
  • Source maps disabled or restricted
  • Error messages generic (no stack traces)