Scans codebases for vulnerabilities like injections, XSS, secrets exposure, insecure deps, and access control flaws across JavaScript, TypeScript, Python, Java, PHP, Go, Ruby, Rust.
From awesome-copilotnpx claudepluginhub ctr26/dotfiles --plugin awesome-copilotThis skill uses the workspace's default tool permissions.
references/language-patterns.mdreferences/report-format.mdreferences/secret-patterns.mdreferences/vuln-categories.mdreferences/vulnerable-packages.mdFetches up-to-date documentation from Context7 for libraries and frameworks like React, Next.js, Prisma. Use for setup questions, API references, and code examples.
Fetches up-to-date documentation from Context7 for libraries and frameworks like React, Next.js, Prisma. Use for setup questions, API references, and code examples.
Uses ctx7 CLI to fetch current library docs, manage AI coding skills (install/search/generate), and configure Context7 MCP for AI editors.
An AI-powered security scanner that reasons about your codebase the way a human security researcher would — tracing data flows, understanding component interactions, and catching vulnerabilities that pattern-matching tools miss.
Use this skill when the request involves:
/security-review or /security-review <path>Unlike traditional static analysis tools that match patterns, this skill:
Follow these steps in order every time:
Determine what to scan:
/security-review src/auth/), scan only that scopereferences/language-patterns.md to load language-specific vulnerability patternsBefore scanning source code, audit dependencies first (fast wins):
package.json + package-lock.json for known vulnerable packagesrequirements.txt / pyproject.toml / Pipfilepom.xml / build.gradleGemfile.lockCargo.tomlgo.sumreferences/vulnerable-packages.md for a curated watchlistScan ALL files (including config, env, CI/CD, Dockerfiles, IaC) for:
.env files accidentally committedreferences/secret-patterns.md for regex patterns and entropy heuristics to applyThis is the core scan. Reason about the code — don't just pattern-match.
Read references/vuln-categories.md for full details on each category.
Injection Flaws
Authentication & Access Control
Data Handling
Cryptography
Business Logic
After the per-file scan, perform a holistic review:
For EACH finding:
Output the full report in the format defined in references/report-format.md.
For every CRITICAL and HIGH finding, generate a concrete patch:
Explicitly state: "Review each patch before applying. Nothing has been changed yet."
| Severity | Meaning | Example |
|---|---|---|
| 🔴 CRITICAL | Immediate exploitation risk, data breach likely | SQLi, RCE, auth bypass |
| 🟠 HIGH | Serious vulnerability, exploit path exists | XSS, IDOR, hardcoded secrets |
| 🟡 MEDIUM | Exploitable with conditions or chaining | CSRF, open redirect, weak crypto |
| 🔵 LOW | Best practice violation, low direct risk | Verbose errors, missing headers |
| ⚪ INFO | Observation worth noting, not a vulnerability | Outdated dependency (no CVE) |
For detailed detection guidance, load the following reference files as needed:
references/vuln-categories.md — Deep reference for every vulnerability category with detection signals, safe patterns, and escalation checkers
SQL injection, XSS, command injection, SSRF, BOLA, IDOR, JWT, CSRF, secrets, cryptography, race condition, path traversalreferences/secret-patterns.md — Regex patterns, entropy-based detection, and CI/CD secret risks
API key, token, private key, connection string, entropy, .env, GitHub Actions, Docker, Terraformreferences/language-patterns.md — Framework-specific vulnerability patterns for JavaScript, Python, Java, PHP, Go, Ruby, and Rust
Express, React, Next.js, Django, Flask, FastAPI, Spring Boot, PHP, Go, Rails, Rustreferences/vulnerable-packages.md — Curated CVE watchlist for npm, pip, Maven, Rubygems, Cargo, and Go modules
lodash, axios, jsonwebtoken, Pillow, log4j, nokogiri, CVEreferences/report-format.md — Structured output template for security reports with finding cards, dependency audit, secrets scan, and patch proposal formatting
report, format, template, finding, patch, summary, confidence