From claudekit
Reviews code for OWASP Top 10 vulnerabilities, input validation, auth flows, security headers, CSRF/XSS prevention, and dependency audits.
npx claudepluginhub duthaho/claudekit --plugin claudekitThis skill uses the workspace's default tool permissions.
- Reviewing code for OWASP Top 10 vulnerabilities
Audits code for OWASP Top 10 vulnerabilities, auth implementations, CORS/CSRF/XSS protections, security headers, dependency risks, and clean code practices like DRY/SOLID. Use before deploy.
Audits code security using OWASP Top 10 checklists for input validation, auth/authz, API security, data protection, and logging. Use for secure implementations and vulnerability reviews.
Conducts security reviews using checklists and patterns for authentication, user input, secrets, API endpoints, SQL injection, XSS/CSRF, and rate limiting.
Share bugs, ideas, or general feedback.
npm audit, pip-audit)| Topic | Reference | Key content |
|---|---|---|
| All security patterns | references/patterns.md | Input validation, SQL injection, XSS, CSRF, auth, headers |
| OWASP Top 10 cheatsheet | references/owasp-top10-cheatsheet.md | Quick reference for each vulnerability category |
| Security headers | references/security-headers.md | CSP, HSTS, X-Frame-Options, Referrer-Policy |
| Security checklist | references/security-checklist.md | Pre-deploy security review checklist |
| Security audit script | references/security-audit.py | Automated security scanning utility |
npm audit / pip-audit / safety check in CI.dangerouslySetInnerHTML or | safe without sanitization — XSS vector.Access-Control-Allow-Origin: * with credentials is a security hole.defense-in-depth — Multi-layer validation so a single-point failure can't cause data corruptiontesting — Security test patterns (input validation, authz boundaries)devops — Container and CI hardening