Security review checklist for code analysis. Use when reviewing code for security vulnerabilities, authentication issues, input validation, or OWASP top 10 concerns.
This skill inherits all available tools. When active, it can use any tool Claude has access to.
Use this checklist when performing security reviews of code changes.
When reporting issues, use these severity levels:
| Level | Description | Example |
|---|---|---|
| CRITICAL | Immediate exploitation risk | SQL injection, RCE |
| HIGH | Significant security impact | Auth bypass, XSS |
| MEDIUM | Moderate risk with conditions | CSRF, info disclosure |
| LOW | Minor security concern | Missing headers |