review-security
2
总安装量
2
周安装量
#72455
全站排名
安装命令
npx skills add https://github.com/ssiumha/dots --skill review-security
Agent 安装分布
opencode
2
claude-code
2
github-copilot
2
codex
2
kimi-cli
2
gemini-cli
2
Skill 文档
Security Review
ì½ë ë³ê²½ì¬íì ë³´ì ê´ì ìì ì²´í¬íë ì 문 리뷰 ì¤í¬ì ëë¤.
Instructions
리뷰 ë²ì ê²°ì
ì¬ì©ì ìì²ì ë°ë¼ ìí¬íë¡ì° ì í:
- ë³ê²½ë íì¼ë§ 리뷰 (기본) – Git diff 기ë°
- í¹ì íì¼/ëë í 리 리뷰 – ì¬ì©ì ì§ì ê²½ë¡
- ì ì²´ íë¡ì í¸ ì¤ìº – ì´ê¸° ì¤ì , ì 기 ê°ì¬
Workflow 1: ë³ê²½ë íì¼ ë³´ì 리뷰 (기본)
git diff --name-only HEADë¡ ë³ê²½ íì¼ íì¸- ì½ë íì¼ íí°ë§ (
.js,.ts,.py,.goë±) - ê° íì¼ Read â ë³´ì ì²´í¬ë¦¬ì¤í¸ ì ì©
- ì¬ê°ëë³ ë¦¬í¬í¸ ìì±
Workflow 2: í¹ì íì¼/ëë í 리 리뷰
- Globì¼ë¡ ëì íì¼ íì¸
- ê° íì¼ Read â ë³´ì ì²´í¬ë¦¬ì¤í¸ ì ì©
- 리í¬í¸ ìì±
Workflow 3: ì ì²´ íë¡ì í¸ ì¤ìº
- ì°ì ìì ëë í 리 ê²°ì :
auth/,api/,config/ - ìì°¨ 리뷰, ì¬ê°í ì´ì ì¦ì ë³´ê³
- ì¢ í© ë¦¬í¬í¸
ë³´ì ì²´í¬ë¦¬ì¤í¸
ìì¸ í¨í´ì resources/ 참조:
| ì¬ê°ë | í목 | 참조 |
|---|---|---|
| Critical | Hardcoded Credentials, SQL Injection, XSS, SSRF, Command Injection, Path Traversal | 01-critical-patterns.md |
| High | CSRF, File Upload, Deserialization, Weak Crypto, JWT, Mass Assignment, Open Redirect | 02-high-patterns.md |
| Medium | HTTPS, Error Exposure, Rate Limiting, Cookie Settings, Input Validation, XXE | 03-medium-low-patterns.md |
| Low | CORS, Security Headers, Server Banner, Dependencies | 03-medium-low-patterns.md |
Secret íì§
ìë¹ì¤ë³ API í¤ í¨í´: 04-secret-patterns.md
| ìë¹ì¤ | í¨í´ ìì |
|---|---|
| AWS | AKIA[0-9A-Z]{16} |
| GitHub | ghp_[A-Za-z0-9]{36} |
| OpenAI | sk-[A-Za-z0-9]{48}, sk-proj-[A-Za-z0-9-_]{48,} |
| Anthropic | sk-ant-[A-Za-z0-9-_]{95} |
| Stripe | sk_live_[0-9a-zA-Z]{24,} |
AI ìì± ì½ë 주ìì
05-ai-code-security.md 참조:
- ë¹ catch ë¸ë¡
- ì ë ¥ ê²ì¦ ëë½
- íëì½ë©ë ì¤ì ê°
- ì¤ëë API ì¬ì©
ì¸ë¶ ë구 ì°ë
06-tool-integration.md 참조:
# Semgrep (ê¶ì¥)
semgrep --config=p/owasp-top-ten .
# Secret scanning
gitleaks detect --source .
# Dependency check
npm audit # Node.js
pip-audit # Python
ì¸ì´ë³ í¹í í¨í´
07-language-specific.md 참조:
| ì¸ì´ | 주ì ìí |
|---|---|
| Python | pickle, eval, shell=True |
| JavaScript | XSS, prototype pollution |
| Go | text/template, SQL concat |
| Rust | unsafe blocks, unwrap |
| Java | deserialization, XXE |
리í¬í¸ íì
# Security Review Report
**Date:** YYYY-MM-DD
**Files:** N files
**Issues:** X Critical, Y High, Z Medium, W Low
---
## Critical Issues
### 1. [Issue Title]
**File:** `path/file.ts:42`
**Description:** ...
**Code:** `...`
**Fix:** ...
**Reference:** [OWASP Link]
---
## Summary
- Good practices: [list]
- Areas needing attention: [list]
ì¤ì ìì¹
- False Positive ìµìí: íì¤í ì´ìë§ ë³´ê³
- Context ê³ ë ¤: í ì¤í¸ ì½ëë ìíë 기ì¤
- 구체ì ì ì: “ì´ë»ê² ê³ ì¹ëì§” ì ì
- OWASP 참조: ê³µì 문ì ë§í¬ ì ê³µ
- ê¸ì ì í¼ëë°±: ìí ë¶ë¶ë ì¸ê¸
OWASP Top 10 (2021)
- Broken Access Control
- Cryptographic Failures
- Injection
- Insecure Design
- Security Misconfiguration
- Vulnerable Components
- Authentication Failures
- Data Integrity Failures
- Logging Failures
- Server-Side Request Forgery (SSRF)