Security vulnerability scanning, secret detection, dependency auditing, and OWASP best practices. Use when performing security audits, scanning for vulnerabilities, detecting exposed secrets, checking dependencies, validating security headers, implementing OWASP patterns, or when user mentions security, vulnerabilities, secrets, CVE, OWASP, npm audit, security headers, or penetration testing.
Limited to specific tools
Additional assets for this skill
This skill is limited to using the following tools:
examples/basic-secret-scanning.mdexamples/ci-cd-security-integration.mdexamples/dependency-scanning.mdexamples/owasp-compliance.mdexamples/security-report-interpretation.mdscripts/README.mdscripts/check-security-headers.shscripts/generate-security-report.shscripts/scan-dependencies.shscripts/scan-owasp.shscripts/scan-secrets.shtemplates/secret-patterns.jsontemplates/security-checklist.mdtemplates/security-headers-config.jsontemplates/security-report-html.templatetemplates/security-report-json.templatetemplates/vulnerability-remediation.mdname: Security Scanning Patterns description: Security vulnerability scanning, secret detection, dependency auditing, and OWASP best practices. Use when performing security audits, scanning for vulnerabilities, detecting exposed secrets, checking dependencies, validating security headers, implementing OWASP patterns, or when user mentions security, vulnerabilities, secrets, CVE, OWASP, npm audit, security headers, or penetration testing. allowed-tools:
CRITICAL: The description field above controls when Claude auto-loads this skill.
Comprehensive security scanning capabilities including secret detection, dependency vulnerability scanning, OWASP Top 10 pattern detection, security header validation, and automated security reporting. Supports multiple languages (JavaScript, TypeScript, Python, Go, Rust, Java) and provides actionable remediation guidance.
Scan codebases for exposed credentials, API keys, tokens, and sensitive data:
Process:
bash scripts/scan-secrets.sh <target-directory> to scan for secretstemplates/secret-patterns.json for comprehensive regex patternsPatterns Detected:
Output: JSON report with severity, location, and remediation steps
Scan project dependencies for known CVEs across multiple ecosystems:
Process:
bash scripts/scan-dependencies.sh <project-directory> for multi-language scanningSupported Ecosystems:
Output: Vulnerability report with severity ratings and upgrade paths
Scan code for common OWASP Top 10 vulnerabilities:
Process:
bash scripts/scan-owasp.sh <codebase-directory> to detect patternsOWASP Categories Covered:
Output: Categorized findings with OWASP reference links
Validate HTTP security headers for web applications:
Process:
bash scripts/check-security-headers.sh <url-or-config> to validate headerstemplates/security-headers-config.json for recommended settingsHeaders Validated:
Output: Header compliance report with configuration recommendations
Generate aggregated security reports combining all scan results:
Process:
bash scripts/generate-security-report.sh <scan-results-directory> to aggregatetemplates/security-report-html.template) or JSON (templates/security-report-json.template)templates/vulnerability-remediation.md for fix guidanceReport Sections:
Output Formats: HTML dashboard, JSON data, Markdown summary, SARIF format
Use templates/security-checklist.md for comprehensive security reviews:
Categories:
Typical Security Audit Process:
Initial Scan: Run all scanners against the codebase
bash scripts/scan-secrets.sh ./project
bash scripts/scan-dependencies.sh ./project
bash scripts/scan-owasp.sh ./project
bash scripts/check-security-headers.sh https://example.com
Generate Report: Aggregate results into comprehensive report
bash scripts/generate-security-report.sh ./scan-results --format html
Review Findings: Analyze security-report.html, prioritize critical issues
Remediate: Use templates/vulnerability-remediation.md for fix guidance
Validate: Re-scan after fixes to confirm remediation
CI/CD Integration: Add security scans to pipeline (see examples/ci-cd-security-integration.md)