By srajangpt1
Perform pre-coding security assessments on tasks to identify risks and OWASP mitigations, generate developer-focused threat models with attack scenarios and fixes, and review code for vulnerabilities like injections, XSS, and deserialization in Python, JavaScript/TypeScript, React, Java, Go, Ruby.
npx claudepluginhub srajangpt1/ai-security-crewPre-coding security assessment for any development task. Use this skill whenever the user is about to start coding a feature and wants to know the security requirements, risks, or considerations first — even if they don't say "security review" explicitly. Trigger on phrases like "before I code this", "what are the security requirements for", "security considerations for", "is this secure to build", "what should I watch out for when building", or when a user describes a feature (login, payments, file upload, API, auth, etc.) and asks how to approach it safely. Also trigger when user asks to "vibe code" securely or mentions they want security built in from the start.
Threat modeling for a feature, component, or system. Use this skill whenever the user wants to think through what could go wrong security-wise with something they're building, asks "what are the security threats for", "threat model this", "what attacks should I worry about", "help me think through the security of", or is designing a new feature and wants to identify risks before coding. Also trigger for phrases like "attack surface", "what can an attacker do", "security design review", or when building something involving auth, payments, file handling, multi-tenancy, external APIs, or sensitive data flows. This produces a concrete, developer-friendly threat model — not abstract frameworks — with actionable mitigations and an optional threat-model.md file.
Security review of code for vulnerabilities. Use this skill whenever the user wants to check code for security issues, asks "is this code secure?", "review this for vulnerabilities", "any security issues here?", or pastes code and asks for feedback. Also trigger when the user has just finished coding a feature (especially auth, APIs, file handling, database queries, or anything that handles user input) and wants to verify it before shipping. Trigger on phrases like "review the code", "check for vulnerabilities", "audit this", "is this safe?", "security check on this", or after generating code with an AI and wanting to validate it. Works with any language: Python, JavaScript, TypeScript, Java, Go, Ruby, SQL, etc.
Security scanning, dependency CVE audits, and exposure-aware risk prioritization.
Share bugs, ideas, or general feedback.
Repository-grounded threat modeling that enumerates trust boundaries, assets, attacker capabilities, abuse paths, and mitigations, and writes a concise Markdown threat model. Trigger only when the user explicitly asks to threat model a codebase or path, enumerate threats/abuse paths, or perform AppSec threat modeling. Do not trigger for general architecture summaries, code review, or non-security design work. Originally from OpenAI's curated skills catalog.
Open-source cybersecurity analysis agent. Scans any local project for vulnerabilities: code security (SAST), dependency CVEs (SCA), secret leaks, authentication/authorization flaws, cryptographic weaknesses, misconfigurations, supply chain risks, and CI/CD security. Covers all OWASP 2025 Top 10 and CWE Top 25 categories. Generates prioritized reports with remediation guidance. Invoke with /cyber-neo [path].
Automated security vulnerability testing covering OWASP Top 10, SQL injection, XSS, CSRF, and authentication issues
Security best practices advisor with vulnerability detection and fixes
AI-powered cybersecurity code review with 8 specialist agents, OWASP Top 10:2021, CWE Top 25:2024, MITRE ATT&CK v15, and framework-aware false-positive suppression