npx claudepluginhub jmagly/aiwg --plugin sdlc# Security Audit Command Perform comprehensive security assessment ## Instructions Perform a systematic security audit following these steps: 1. **Environment Setup** - Identify the technology stack and framework - Check for existing security tools and configurations - Review deployment and infrastructure setup 2. **Dependency Security** - Scan all dependencies for known vulnerabilities - Check for outdated packages with security issues - Review dependency sources and integrity - Use appropriate tools: `npm audit`, `pip check`, `cargo audit`, etc. 3. **Authenticat...
/security-auditPerforms systematic security audit across dependencies, auth, inputs, secrets, infra, headers, and more. Outputs findings by severity with remediations, code examples, and executive summary.
/security-auditPerforms systematic security audit across dependencies, auth, inputs, secrets, infra, headers, and more. Outputs findings by severity with remediations, code examples, and executive summary.
/security-auditPerforms security vulnerability assessment covering authentication, authorization, input validation, and infrastructure, producing phased reports and remediation plans.
/security-auditAudits plugin configuration files including hooks, settings, agents, and CLAUDE.md for 8 security risks like command injection, secrets, and over-permissions. Produces severity-graded report.
/security-audit7-domain security hardening audit — OWASP Top 10 2025, MITRE ATT&CK mapping, NIST CSF 2.0 alignment, secret detection, supply chain audit, container security, DevSecOps pipeline. Grounded in 734 cybersecurity skills.
Perform comprehensive security assessment
Perform a systematic security audit following these steps:
Environment Setup
Dependency Security
npm audit, pip check, cargo audit, etc.Authentication & Authorization
Input Validation & Sanitization
Data Protection
Secrets Management
Error Handling & Logging
Infrastructure Security
Security Headers & CORS
Reporting
Use automated security scanning tools when available and provide manual review for complex security patterns.