From enterprise-harness-engineering
Performs structured security and compliance reviews on code, configs, and docs. For MR/PR, architecture reviews, and scans. Detects secrets exposure, PII leakage, access gaps, violations.
npx claudepluginhub addxai/enterprise-harness-engineering --plugin enterprise-harness-engineeringThis skill uses the workspace's default tool permissions.
A comprehensive security and compliance review framework. Based on input materials and baseline policies, intelligently determines the risk surface and provides actionable remediation recommendations.
Audits code for security vulnerabilities including OWASP Top 10, auth flaws, injection, data exposure, and dependency risks using STRIDE threat modeling and phased reviews.
Blocks unsafe code before commit with secret scanning, OWASP Top 10 detection, dependency audits, and permission checks. Hard gate that halts on critical findings.
Scans codebases for OWASP Top 10 vulnerabilities via static analysis: secret exposure, injection flaws, auth/authz gaps, supply-chain risks, misconfigurations, logging failures. Use before deployments, PR merges, auth/payment changes.
Share bugs, ideas, or general feedback.
A comprehensive security and compliance review framework. Based on input materials and baseline policies, intelligently determines the risk surface and provides actionable remediation recommendations.
For detailed rules and examples, see references/REFERENCE.md.
Consumer-facing / Internal product / MixedRelevant / Not Relevant (N/A) / UnknownUnknown triggers clarification/blocking only for "must-clarify items"Must output a table: Risk Category | Relevance | Trigger Clues | Handling | Evidence/Recommendations
Required risk categories to cover:
R0 System TypeR4 Bulk Capability/ExportR5 Observation Leakage (Logs/Tracking/Error Reporting)R6 Secrets/CredentialsR7 Third-Party BoundaryR11 Zero Human Access to High-Sensitivity Data (Video/Address/Phone)R12 Retention & Deletion/DSARR14 Agent Skills Supply ChainR15 Location PermissionsIf evidence is insufficient: handling = Default standard + recommendation, with the gap marked as "evidence needed (not clarification)":
If the MR/repository contains SKILL.md, .cursor/skills/, .cursor/rules/, AGENTS.md:
ignore previous instructions, bypass safety, etc.)scripts/ directory; risk is 2.12x that of instruction-only Skills)<!-- -->, invisible to humans but readable by LLMs)Not Relevant (N/A)Absolutely prohibited to request user geolocation permissions on any platform, including but not limited to:
ACCESS_FINE_LOCATION, ACCESS_COARSE_LOCATION, ACCESS_BACKGROUND_LOCATIONNSLocationWhenInUseUsageDescription, NSLocationAlwaysUsageDescriptionnavigator.geolocation, Permissions API geolocationgeolocator, location and other location pluginsCity/region information may only be obtained through user's active selection. The selection result must be persisted and not re-asked.
Remediation Required / FailRemediation Required / FailRemediation Required / Fail (R15)Must strictly follow this Markdown structure:
- **scope**: Modules/directories/PR scope covered by this review
- **System type and adopted strategy**: Consumer-facing / Internal product / Mixed
- **Blocking items (if any)**: List blocking items (reference R#/G#/E#)
- **Clarification questions and unknowns**: Cover only the must-clarify checklist
- **Conclusion**: Pass / Conditional Pass / Fail
- **Risk level**: Low / Medium / High
- **Risk item summary**: Reference R#
- **Key evidence index**: List E# only
| Risk ID | Risk Category | Relevance | Trigger Clues | Handling | Evidence/Recommendations |
|---|---|---|---|---|---|
| R0 | System Type | Relevant/N/A/Unknown | Clues | Clarify/Default standard+recommendation/Block | E#/Recommendations |
| Gap ID | Gap Description | Risk Level | Related Risk Item | Evidence Reference | Recommended Remediation |
|---|---|---|---|---|---|
| G1 | Description | High/Medium/Low | R# | E# | A# |
| Priority | Action ID | Recommendation | Related Gap | Evidence Reference |
|---|---|---|---|---|
| Fix Now | A1 | Specific recommendation | G# | E# |
| Evidence ID | Evidence Type | Reference | Excerpt |
|---|---|---|---|
| E1 | Doc/Code/Config | path:Lx-Ly | Excerpt |
API_KEY = "sk-<account-id>abcdef" # Violates R6
API_KEY = vault.read('myapp/api-key')
For more examples, see references/REFERENCE.md.
| Scenario | Condition |
|---|---|
| Local dev environment | Configuration used only for local testing (must not be committed to repository) |
| Legacy system migration | Legacy system undergoing compliance remediation (migration plan must be provided) |
Exemption method: /override skill=security-compliance-review reason="..." evidence="..."