Scans code for input validation gaps risking SQLi, XSS, command injection, path traversal, buffer overflows. Use when auditing user input from HTTP params, forms, APIs.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin input-validation-scannerThis skill is limited to using the following tools:
Scan application source code for missing or insufficient input validation that could lead to injection attacks (SQL, XSS, command injection), buffer overflows, and path traversal vulnerabilities. Analyzes how user-provided data flows from HTTP parameters, form fields, and API inputs through the application to identify locations where sanitization or validation is absent.
Scans code for security vulnerabilities like XSS, SQL injection, CSRF, path traversal, and authentication flaws. Useful for quick checks on user input, DB queries, APIs, and file operations.
Scans codebases for OWASP Top 10 vulnerabilities via static analysis: secret exposure, injection flaws, auth/authz gaps, supply-chain risks, misconfigurations, logging failures. Use before deployments, PR merges, auth/payment changes.
Share bugs, ideas, or general feedback.
Scan application source code for missing or insufficient input validation that could lead to injection attacks (SQL, XSS, command injection), buffer overflows, and path traversal vulnerabilities. Analyzes how user-provided data flows from HTTP parameters, form fields, and API inputs through the application to identify locations where sanitization or validation is absent.
This skill activates when you need to:
User request: "Scan the user profile module for potential XSS vulnerabilities."
The skill will:
User request: "Check the database access layer for potential SQL injection risks."
The skill will:
This skill can be used in conjunction with other security-related skills to provide a more comprehensive security assessment. For example, it can be combined with a static analysis skill to identify other types of vulnerabilities or with a dependency scanning skill to identify vulnerable third-party libraries.
If security scanning fails: