From coding-agent
Security review checklist for code review and implementation. Covers OWASP top 10, authentication, data protection, and common vulnerabilities.
npx claudepluginhub devjarus/coding-agentThis skill uses the workspace's default tool permissions.
Use this checklist during code review and before marking any feature complete. Work through each section systematically.
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
Use this checklist during code review and before marking any feature complete. Work through each section systematically.
<, >, &, ", ')../ traversal)/api/orders/123 only if order 123 belongs to thembcrypt or argon2 — never md5, sha1, or unsalted hashes*max_tokens) are set on every LLM call — no unbounded generation| Vulnerability | Defense |
|---|---|
| SQL Injection | Use parameterized queries or an ORM. Never concatenate user input into SQL strings. |
| XSS (Cross-Site Scripting) | Encode output for the rendering context. Use a templating engine that auto-escapes. |
| Path Traversal | Resolve and validate paths against an allowlisted base directory. Reject inputs containing ... |
| Command Injection | Use APIs that accept argument arrays, not shell strings. Never pass user input to exec/system. |
| SSRF (Server-Side Request Forgery) | Validate and allowlist destination URLs for outbound requests. Block access to internal IP ranges. |
| Insecure Deserialization | Validate and sanitize data before deserializing. Avoid deserializing untrusted data into objects. |
| Broken Access Control | Check ownership and permissions on every data access, not just at the route level. |
| Security Misconfiguration | Disable debug modes in production. Remove default credentials. Apply least-privilege to service accounts. |