Generate comprehensive security audit reports for applications and systems. Use when you need to assess security posture, identify vulnerabilities, evaluate compliance status, or create formal security documentation. Trigger with phrases like "create security audit report", "generate security assessment", "audit security posture", or "PCI-DSS compliance report".
Limited to specific tools
Additional assets for this skill
This skill is limited to using the following tools:
assets/README.mdreferences/README.mdscripts/README.mdscripts/report_formatter.pyscripts/security_scan.pyname: generating-security-audit-reports description: | Generate comprehensive security audit reports for applications and systems. Use when you need to assess security posture, identify vulnerabilities, evaluate compliance status, or create formal security documentation. Trigger with phrases like "create security audit report", "generate security assessment", "audit security posture", or "PCI-DSS compliance report". allowed-tools:
Before using this skill, ensure:
Gather security information from available sources:
Process collected data to identify:
Create structured audit report with:
Generate report in requested format:
The skill produces:
Primary Output: Comprehensive security audit report saved to {baseDir}/reports/security-audit-YYYYMMDD.md
Report Structure:
# Security Audit Report - [System Name]
## Executive Summary
- Overall risk rating
- Critical findings count
- Compliance status
## Vulnerability Findings
### Critical (CVSS 9.0+)
- [CVE-XXXX-XXXX] Description
- Impact assessment
- Remediation steps
### High (CVSS 7.0-8.9)
[Similar structure]
## Compliance Assessment
- PCI-DSS: 85% compliant (gaps identified)
- GDPR: 92% compliant
- SOC 2: In progress
## Remediation Plan
Priority matrix with timelines
## Technical Appendices
Evidence and scan outputs
Secondary Outputs:
Common Issues and Resolutions:
Missing Scan Data
Incomplete Compliance Framework
Access Denied to Configuration Files
Large Dataset Processing
Security Standards References:
Compliance Frameworks:
Vulnerability Databases:
Report Templates:
Integration Points: