OWASP Top 10-based security review and vulnerability detection. Use when reviewing security (セキュリティ), vulnerabilities (脆弱性), XSS, Cross-Site Scripting, SQL injection (SQLインジェクション), CSRF, authentication (認証), authorization (認可), encryption (暗号化), secure coding (セキュアコーディング), access control, OWASP, SSRF, passwords (パスワード), tokens, sessions (セッション), rate limiting, brute force (ブルートフォース), broken access control, cryptographic failures, command injection, NoSQL injection, security misconfiguration, logging, monitoring, or dependency vulnerabilities (脆弱性スキャン). Detects common vulnerability patterns and suggests secure implementations based on OWASP Top 10. Essential for security-focused code reviews.
Limited to specific tools
Additional assets for this skill
This skill is limited to using the following tools:
references/owasp-advanced.mdreferences/owasp-basic.mdreferences/owasp-injection.md"Security is not a feature, it's a foundation"
Security should be built into the design from the start, not added afterward.
This skill is organized into 3 specialized sections for efficient context usage:
File: references/owasp-basic.md
Tokens: ~900
Focus: Access Control (OWASP 1), Cryptographic Failures (OWASP 2), Authentication Failures (OWASP 7)
Triggers: Access Control, Broken Access Control, 認証, authentication, 認可, authorization, 暗号化, encryption, password, パスワード, session, セッション
Coverage:
File: references/owasp-injection.md
Tokens: ~600
Focus: Injection (OWASP 3) - SQL, NoSQL, Command + XSS/CSRF Prevention
Triggers: injection, SQL injection, SQLインジェクション, XSS, Cross-Site Scripting, CSRF, Command Injection, NoSQL injection
Coverage:
File: references/owasp-advanced.md
Tokens: ~800
Focus: Design (OWASP 4-6), Monitoring (OWASP 8-10), SSRF
Triggers: rate limiting, brute force, ブルートフォース, SSRF, Server-Side Request Forgery, Security Misconfiguration, logging, monitoring, dependencies
Coverage:
User: "Implement user registration API"
Security Review Skill triggers →
"From a security perspective, let's ensure:
1. Password hashing (using bcrypt)
2. Rate limiting (brute force protection)
3. Input validation (SQL injection protection)
4. HTTPS communication
5. CSRF token
I'll provide implementation examples..."
Implementing login functionality
Creating APIs
Database operations
Implementing forms
Remember: "Security is not about being perfect, it's about making it harder for attackers"