From claude-impl-tools
Scans codebases for OWASP Top 10 vulnerabilities via static analysis: secret exposure, injection flaws, auth/authz gaps, supply-chain risks, misconfigurations, logging failures. Use before deployments, PR merges, auth/payment changes.
npx claudepluginhub insightflo/claude-impl-tools --plugin claude-impl-toolsThis skill uses the workspace's default tool permissions.
> **Purpose**: Detect and surface critical security flaws in a codebase via static analysis before deployment, and deliver reproducible **evidence** and **remediation guidance**.
Scans codebases for vulnerabilities like injections, XSS, secrets exposure, insecure deps, and access control flaws across JavaScript, TypeScript, Python, Java, PHP, Go, Ruby, Rust.
Scans local projects for dependency vulnerabilities (SCA), code security patterns (SAST), leaked secrets, auth/crypto flaws, misconfigs, supply chain risks, CI/CD issues. Generates prioritized report with remediation guidance.
Runs hand-curated security sweep on git repos detecting leaked secrets, SQL/shell injections, XSS sinks, path traversal, deserialization risks, missing cookie flags, wildcard CORS, tracked credentials. Triages findings as real/false-positive.
Share bugs, ideas, or general feedback.
Purpose: Detect and surface critical security flaws in a codebase via static analysis before deployment, and deliver reproducible evidence and remediation guidance.
Core principle: This skill is analysis and reporting only. It does not auto-fix anything.
/audit integration: Performs the security track within
/audit's 5-stage quality audit and can deliver results as standard artifacts.
| MCP | Required | Purpose |
|---|---|---|
| None | - | Uses basic search/static analysis tools |
External SAST/Dependency Scan result files are supported in interpret/summarize mode only.
file_path:line-based evidencefirst 3–4 chars + "***" + (length/type hint)
AKIA*** (len=20), sk-*** (prefix=sk-), ***PRIVATE KEY***src/, app/, server/, api/, infra/ (if present), config files**/node_modules/**, **/dist/**, **/build/**, **/.next/**, **/coverage/**, **/*.min.*/audit integrationCompletion criteria: include/exclude paths, scan mode (quick/standard/deep), and output format (md/json) confirmed.
Check items
.env* and credential files tracked in the repoEvidence requirements
file_path:line + (up to 5 lines) snippet (masking applied)Post-exposure response procedure (include in report)
Completion criteria: Secret candidates classified as Confirmed / FP (false positive) / Needs-more-context.
Each item requires at least one "detection rule" and "required evidence".
| OWASP | Core question (summary) | Minimum evidence (required) |
|---|---|---|
| A01 Broken Access Control | Is authorization validation missing or bypassable? | Guard/policy code location + access path/resource identifier handling |
| A02 Cryptographic Failures | Is storage/transmission/key management weak? | Algorithm/mode/key storage location, TLS/cookie config |
| A03 Injection | Does external input reach a dangerous sink? | Source→Sink path + query/command/template construction method |
| A04 Insecure Design | Are security controls missing at the design level? | Evidence of absent threat model / ambiguous auth model / unprotected sensitive operations |
| A05 Security Misconfiguration | Are there unsafe settings, headers, or debug flags? | Config files/server init code + actual values |
| A06 Vulnerable & Outdated Components | Are vulnerable or outdated components in use? | lockfile/version/supply-chain signals (postinstall, etc.) |
| A07 Identification & Authentication Failures | Is the authentication flow broken? | Token validation (signature/expiry/iss/aud), session/reset flow evidence |
| A08 Software & Data Integrity Failures | Is there update/execution without integrity verification? | External script/update/plugin load paths |
| A09 Security Logging & Monitoring Failures | Are security events being logged and detected? | Minimum event list coverage + logging locations |
| A10 Server-Side Request Forgery (SSRF) | Does the server make requests based on attacker-controlled input? | URL fetch call sites + validation/blocking logic |
iss/aud and other critical claim validation../, absolute paths, URL decoding?pickle, unsafe YAML load, Java ObjectInputStream (language-specific)X-Frame-Options or CSP frame-ancestorsUse when available (if environment permits)
npm audit, pnpm audit, yarn auditpip-audit, poetry auditSupply Chain Risk (static checks)
package-lock.json vs. package.json mismatch)postinstall/preinstall install scriptsCompletion criteria: Record "vulnerabilities (version)" and "supply-chain signals (behavior)" separately.
Before reporting any candidate vulnerability, verify the following:
file:line + snippet (up to 5 lines, masked) + 1–2 sentences on "why this is dangerous"Completion criteria: All candidates classified as Confirmed / Likely / Needs-context / False-positive.
Each issue must include the following fields:
SR-0001 formatfile_path:line| ID | Severity | OWASP | Title | Location | Confidence |
|---|---|---|---|---|---|
| SR-0001 | HIGH | A03 | ... | src/...:123 | High |
| Command | Description |
|---|---|
/security-review | Default (standard) scan |
/security-review --mode quick | Fast scan of core rules only |
/security-review --mode deep | Full rules + supply-chain/config deep scan |
/security-review --path <dir> | Scan specified path only |
/security-review --include "src/**" | Specify include pattern |
/security-review --exclude "**/node_modules/**,**/dist/**" | Specify exclude pattern |
/security-review --checks "secrets,auth,ssrf" | Re-scan specific categories only |
/security-review --summary | Summary-focused report |
/security-review --owasp | OWASP-mapping-focused output |
/security-review --format md | Default output (Markdown) |
/security-review --format json --out .claude/security-review.json | JSON artifact (automation/integration) |
/security-review --min-confidence high | Output High confidence issues only |
/security-review --severity-threshold high | Use High and above as summary/gate threshold |
/security-review --fail-on high | Fail if any High or above is unresolved (pipeline use) |
/security-review --since <git-ref> | Delta scan focused on changed code |
/security-review --baseline <file> | Compare against existing baseline (skip known/accepted issues) |
/audit Integration Contract/audit: Aggregate score / gate verdict / overall quality integrationsecurity-review: Security flaw identification + evidence + remediation guidance.claude/security-review.json (or --out)scan: include/exclude, mode, checks, timestampfindings[]: required finding fieldslimits: out-of-scope, unchecked itemsredaction: masking policy (raw values forbidden)rule_id (or owasp+cwe) + file + line + sink/source| Situation | Recommended skill | Description |
|---|---|---|
| High-risk vulnerability found | /agile iterate | Create and execute prioritized fix tasks |
| Pre-deployment comprehensive check | /audit | Full quality audit including security |
| Simultaneous code quality improvement | /code-review | Two-stage review to prevent quality regressions |
| Prevent recurring vulnerabilities | /guardrails | Strengthen security guards at generation stage |
| Hook | Effect |
|---|---|
skill-router | Auto-detects /security-review keyword |
post-edit-analyzer | Auto-re-checks security patterns after edits |
git-commit-checker | Warns when high-risk vulnerabilities remain unresolved |
Last Updated: 2026-03-02 (v1.1.0 - Full rewrite: OWASP A01–A10 complete matrix, Web/API high-risk checks, triage, artifacts/flags, /audit contract added)