From appsec
This skill should be used when the user asks to "check GraphQL security", "analyze GraphQL endpoint", "find GraphQL vulnerabilities", "audit GraphQL schema", "check for introspection", "analyze query depth", or mentions "GraphQL", "introspection", "query depth limit", "query complexity", "GraphQL batching", "alias abuse", or "per-field authorization" in a security context.
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Analyze GraphQL APIs for security vulnerabilities including introspection
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Analyze GraphQL APIs for security vulnerabilities including introspection enabled in production, missing query depth limits, no complexity analysis, batching abuse, alias-based denial of service, and missing per-field authorization. GraphQL's flexibility makes it a rich attack surface when default configurations are deployed to production without hardening.
Read ../../shared/schemas/flags.md for the full flag specification. This skill
supports all cross-cutting flags. Key flags for this skill:
--scope determines which files to analyze (default: changed)--depth standard reads code and checks GraphQL configuration--depth deep traces resolvers to data sources and maps authorization coverage--severity filters output (GraphQL issues range from medium to critical)Key CWEs in scope:
Read references/detection-patterns.md for the full catalog of code patterns,
search heuristics, language-specific examples, and false positive guidance.
Parse flags and resolve the file list per ../../shared/schemas/flags.md.
Filter to files likely to contain GraphQL logic:
**/*.graphql, **/schema.*, **/typeDefs*)**/resolvers/**, **/graphql/**)**/server.*, **/app.*, **/index.*)**/middleware/**, **/plugins/**)**/directives/**, **/guards/**)Detect scanners per ../../shared/schemas/scanners.md:
semgrep -- primary scanner for GraphQL patternsgraphql-cop -- specialized GraphQL security auditor (if available)Record which scanners are available and which are missing.
If semgrep is available, run with rules targeting GraphQL:
semgrep scan --config auto --json --quiet <target>
Filter results to rules matching GraphQL security patterns. Normalize output to the findings schema.
Regardless of scanner availability, perform manual code analysis:
When --depth deep, additionally trace:
Format output per ../../shared/schemas/findings.md using the GQL prefix
(e.g., GQL-001, GQL-002).
Include for each finding:
These are the high-signal patterns specific to GraphQL security. Each maps
to a detection pattern in references/detection-patterns.md.
Introspection enabled in production -- __schema and __type queries
are accessible, revealing the entire API schema to attackers.
No query depth limit -- Deeply nested queries can exhaust server resources
(e.g., user { friends { friends { friends { ... } } } }).
No query complexity limit -- Expensive queries with many fields or computed values can cause denial of service.
Batching abuse -- Multiple queries in a single request bypass per-request rate limiting and can brute-force authentication.
Alias-based denial of service -- Using aliases to repeat expensive fields/resolvers many times in a single query.
Missing per-field authorization -- Sensitive fields (email, SSN, balance) exposed to any authenticated user without field-level access checks.
| Scanner | Coverage | Command |
|---|---|---|
| semgrep | Introspection, missing auth directives | semgrep scan --config auto --json --quiet <target> |
| graphql-cop | Introspection, depth, batching, aliases | graphql-cop -t <endpoint> |
Fallback (no scanner): Use Grep with patterns from references/detection-patterns.md
to find GraphQL server configuration, depth/complexity middleware, resolver
authorization, and batching settings. Report findings with confidence: medium.
Use the findings schema from ../../shared/schemas/findings.md.
GQL (e.g., GQL-001)graphqlspecializedGQLCWE-200, CWE-400, CWE-862A05:2021 (Security Misconfiguration)I (Information Disclosure) or D (Denial of Service)Severity guidance for this category: