From appsec
This skill should be used when the user asks to "review plan for security", "check plan for security issues", "security review of implementation plan", "audit the plan for vulnerabilities", or "check my plan before coding". Also triggers when the user mentions security in the context of an implementation plan, architecture proposal, or design document before code has been written. This is the FLAGSHIP pre-code security skill -- no other tool reviews plans at design time.
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Analyze an implementation plan before code exists. Identify security gaps,
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Analyze an implementation plan before code exists. Identify security gaps, implicit trust assumptions, missing threat considerations, and architectural risks while changes are still cheap. This is the most cost-effective point in the development lifecycle to catch security issues -- fixing a design flaw before coding costs 10-100x less than fixing it in production.
Read ../../shared/schemas/flags.md for the full flag specification.
| Flag | Plan Review Behavior |
|---|---|
--scope plan | Default. Reads the implementation plan content. |
--scope file:<path> | Review a plan written to a specific file. |
--depth quick | Check for top 5 most common plan-level security gaps only. |
--depth standard | Full security review against all checklist items. |
--depth deep | Standard + trace data flows described in the plan, model trust boundaries. |
--depth expert | Deep + STRIDE-per-component on the planned architecture, attack tree sketches. |
--format | Default text. Use md for structured report with Mermaid diagrams. |
Most security tools analyze code that already exists. By then, architectural decisions are baked in and expensive to change. This skill shifts security left to the plan phase where:
--scope plan (default): read the implementation plan from the current
planning context. This is typically the plan approved via ExitPlanMode in
Claude Code, or a plan provided by the user.--scope file:<path>: read the specified file.Before reviewing for security, build a mental model:
Work through every item. For each concern found, record it as a finding.
For each identified concern, assess:
For each concern, produce an actionable recommendation:
Output the plan review with findings and recommendations.
Finding ID prefix: PLAN (e.g., PLAN-001).
## Security Plan Review
### Plan Summary
[1-2 sentence summary of what the plan proposes]
### Security Assessment: [PASS | CONCERNS | SIGNIFICANT GAPS]
### Findings
#### PLAN-001: [Title] -- Severity: HIGH
Category: [Auth | Data | Trust Boundary | Architecture | Supply Chain | Assumption]
Concern: [What is missing or risky in the plan]
Risk: [What could go wrong if this ships as-is]
Recommendation: [Specific change to the plan]
Cost to fix now: [Minimal | Moderate | Significant]
Cost to fix later: [Moderate | Significant | Architectural rewrite]
#### PLAN-002: ...
### Plan Strengths
[Security aspects the plan handles well -- acknowledge good design]
### Recommended Plan Additions
[Bullet list of specific items to add to the plan before coding begins]
### Trust Boundary Diagram (--depth deep)
[Mermaid diagram of planned architecture with trust boundaries marked]
Findings follow ../../shared/schemas/findings.md with:
metadata.tool: "review-plan"metadata.framework: depends on invoking contextmetadata.category: "plan-review"references.cwe: Most relevant CWE for the architectural weakness| Severity | Criteria |
|---|---|
critical | Plan has no authentication model for sensitive features, stores credentials in plaintext by design, or exposes PII without encryption |
high | Missing authorization checks on privileged operations, no input validation strategy, trust boundary violations in the architecture |
medium | Incomplete error handling strategy, missing rate limiting, logging gaps for security events |
low | Minor hardening opportunities, defense-in-depth suggestions, style and convention issues |