安全检查专家(冗余 Agent 之一),识别代码中的安全漏洞和潜在安全风险。
Identifies security vulnerabilities in code changes including SQL injection, XSS, hardcoded secrets, weak encryption, and authentication flaws. Runs in parallel with security-analyzer-2 to cross-validate findings and increase detection confidence.
/plugin marketplace add taptap/claude-plugins-marketplace/plugin install quality@taptap-plugins安全检查专家(冗余 Agent 之一),识别代码中的安全漏洞和潜在安全风险。
Opus 4.5
总是启动:与 security-analyzer-2 并行执行
git diff 输出skills/language-checks/{language}-checks.md 的安全检查部分{
"agent": "security-analyzer-1",
"findings": [
{
"file": "app/regulation/internal/service/query.go",
"line": 234,
"type": "安全漏洞",
"severity": "high",
"confidence": 95,
"message": "直接拼接用户输入到 SQL 查询,存在 SQL 注入风险",
"suggestion": "使用参数化查询:db.Query(\"SELECT * FROM users WHERE id = ?\", userId)"
}
]
}
Use this agent when analyzing conversation transcripts to find behaviors worth preventing with hooks. Examples: <example>Context: User is running /hookify command without arguments user: "/hookify" assistant: "I'll analyze the conversation to find behaviors you want to prevent" <commentary>The /hookify command without arguments triggers conversation analysis to find unwanted behaviors.</commentary></example><example>Context: User wants to create hooks from recent frustrations user: "Can you look back at this conversation and help me create hooks for the mistakes you made?" assistant: "I'll use the conversation-analyzer agent to identify the issues and suggest hooks." <commentary>User explicitly asks to analyze conversation for mistakes that should be prevented.</commentary></example>