Run OWASP security checklist covering auth, data, API, mobile, web, and supply chain
npx claudepluginhub cure-consulting-group/productengineeringskillsThis skill is limited to using the following tools:
Structured security review for mobile apps, web apps, APIs, and cloud infrastructure. Run before every launch, after major features, and quarterly on production systems.
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
Structured security review for mobile apps, web apps, APIs, and cloud infrastructure. Run before every launch, after major features, and quarterly on production systems.
Before starting, gather project context silently:
PORTFOLIO.md if it exists in the project root or parent directories for product/team contextcat package.json 2>/dev/null || cat build.gradle.kts 2>/dev/null || cat Podfile 2>/dev/null to detect stackgit log --oneline -5 2>/dev/null for recent changesls src/ app/ lib/ functions/ 2>/dev/null to understand project structureBefore applying the security framework, scan the codebase with Grep:
sk-[a-zA-Z0-9], pk_[a-zA-Z0-9], ghp_, AIza, AKIA, password\s*=\s*["']://.*:.*@)req.body\. or request\. without adjacent validation (zod|joi|yup|validate)innerHTML|dangerouslySetInnerHTML (XSS vectors)\+ .*query| + .*sql)app.get|app.post without auth|protect|verify)allow read: if true or allow write: if truenpm audit --json 2>/dev/null | head -50 to check for known vulnerabilities**/.env, **/credentials*, **/serviceAccount*, **/*.pem that might be committedReport all findings with file:line references before proceeding to the manual framework.
| Trigger | Scope |
|---|---|
| Pre-launch | Full review — all categories below |
| New feature with auth/payments | Auth + data + API sections |
| Dependency update | Supply chain section |
| Quarterly review | Full review + dependency audit |
| Incident response | Targeted review of affected area |
IDOR (Insecure Direct Object Reference):
BAD: /api/users/123/profile (any user can access any profile)
GOOD: /api/users/me/profile (server resolves from auth token)
Broken Access Control:
BAD: Client hides admin button → user modifies request → accesses admin
GOOD: Server validates role on every admin endpoint
NEVER in code:
- API keys, tokens, passwords
- Service account JSON files
- Stripe secret keys
- Database connection strings
- JWT signing secrets
WHERE secrets live:
- Firebase/GCP: Secret Manager
- GitHub: Repository Secrets (CI/CD)
- Local dev: .env files (in .gitignore)
- Mobile: BuildConfig / Info.plist (non-sensitive only)
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
X-XSS-Protection: 0 (deprecated — use CSP instead)
Content-Security-Policy: default-src 'self'; script-src 'self'
Referrer-Policy: strict-origin-when-cross-origin
Permissions-Policy: camera=(), microphone=(), geolocation=()
Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
dangerouslySetInnerHTML with user-supplied contentnpm audit / gradle dependencyCheckAnalyze run in CI* version ranges in dependenciesSECURITY REVIEW REPORT
Application: [NAME]
Date: [TODAY]
Reviewer: [NAME]
RISK SUMMARY
┌─────────────────────┬────────┬────────┐
│ Category │ Status │ Issues │
├─────────────────────┼────────┼────────┤
│ Auth & Authorization│ 🟢🟡🔴 │ X │
│ Data Protection │ 🟢🟡🔴 │ X │
│ API Security │ 🟢🟡🔴 │ X │
│ Mobile Security │ 🟢🟡🔴 │ X │
│ Web Security │ 🟢🟡🔴 │ X │
│ Supply Chain │ 🟢🟡🔴 │ X │
│ Firebase Config │ 🟢🟡🔴 │ X │
└─────────────────────┴────────┴────────┘
CRITICAL (fix before ship):
1. [Issue] — [Risk] — [Fix]
HIGH (fix within 1 sprint):
1. [Issue] — [Risk] — [Fix]
MEDIUM (schedule for next quarter):
1. [Issue] — [Risk] — [Fix]