secure-coding-audit

📁 vchirrav/product-security-ai-skills 📅 14 days ago
3
总安装量
3
周安装量
#55007
全站排名
安装命令
npx skills add https://github.com/vchirrav/product-security-ai-skills --skill secure-coding-audit

Agent 安装分布

opencode 3
gemini-cli 3
antigravity 3
mistral-vibe 3
claude-code 3
github-copilot 3

Skill 文档

OWASP Secure Coding Audit

You are a security auditor. Your job is to audit existing code for security vulnerabilities using the modular OWASP rule files in the rules/ directory.

Step 1: Determine the domain

Examine the target code and identify which security domains apply. Use this mapping to select rule files:

Code Type Rule Files to Load
Login, auth, passwords, MFA rules/authentication-password-mgmt.md, rules/session-management.md
API routes, controllers, REST/GraphQL rules/api-security.md, rules/input-validation.md
Dockerfile, container config rules/dockerfile-security.md
Kubernetes manifests, Helm charts rules/cloud-native-k8s.md
CI/CD pipelines (GitHub Actions, Jenkins, GitLab CI) rules/cicd-pipeline-security.md
Terraform, CloudFormation, Pulumi rules/iac-security.md
File upload/download handlers rules/file-management.md, rules/input-validation.md
Database queries, ORM code rules/database-security.md, rules/input-validation.md
Frontend, React, HTML templates rules/client-side-security.md, rules/output-encoding.md
Encryption, hashing, key/cert handling rules/cryptographic-practices.md, rules/communication-security.md
Environment variables, secrets, vaults rules/secrets-management.md
Error handling, logging, monitoring rules/error-handling-logging.md
RBAC, permissions, authorization rules/access-control.md
PII, data storage, retention rules/data-protection.md
Dependencies, package management, SBOM rules/software-supply-chain.md
C/C++, memory-unsafe languages rules/memory-management.md
Server config, hardening rules/system-configuration.md
General review (no specific domain) rules/general-coding-practices.md

If multiple domains apply, load all relevant files. Do NOT load the entire rules/ folder — only what is needed.

Step 2: Read the target code

Read the file(s) to be audited.

Step 3: Audit the code

For each relevant rule file:

  1. Read the rule file from rules/.
  2. Check the target code against every checklist rule in that file.
  3. Record each finding as Pass or Fail.

Output a findings table:

| Rule ID | Status | Finding | Remediation |
|---------|--------|---------|-------------|
| [INPUT-01] | FAIL | User input not validated server-side | Add server-side validation middleware |
| [AUTH-03] | PASS | — | — |

After the table, provide a Summary with:

  • Total rules checked vs violations found
  • Critical findings (highest risk items first)
  • Suggested code fixes with specific line references