Skill
Community

generating-security-audit-reports

Install
1
Install the plugin
$
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin security-audit-reporter

Want just this skill?

Then install: npx claudepluginhub u/[userId]/[slug]

Description

Generate comprehensive security audit reports for applications and systems. Use when you need to assess security posture, identify vulnerabilities, evaluate compliance status, or create formal security documentation. Trigger with phrases like "create security audit report", "generate security assessment", "audit security posture", or "PCI-DSS compliance report".

Tool Access

This skill is limited to using the following tools:

ReadWriteEditGrepGlobBash(security-scan:*)Bash(report-gen:*)
Supporting Assets
View in Repository
assets/README.md
references/README.md
references/errors.md
references/examples.md
references/implementation.md
scripts/README.md
Skill Content

Generating Security Audit Reports

Overview

Aggregate vulnerability scan results, configuration analyses, and compliance assessments into a structured, auditor-ready security report. Map every finding to a CVSS severity, applicable compliance control (PCI-DSS, HIPAA, SOC 2, GDPR), and a prioritized remediation timeline.

Prerequisites

  • Vulnerability scanner outputs (Nmap, Nessus, OpenVAS, OWASP ZAP) available in ${CLAUDE_SKILL_DIR}/security/
  • Application and infrastructure configuration files accessible
  • SAST/DAST tool results (e.g., Semgrep, Snyk, Trivy, Bandit)
  • Applicable compliance framework documentation identified (PCI-DSS v4.0, HIPAA Security Rule, SOC 2 TSC, GDPR)
  • Write permissions for report output directory ${CLAUDE_SKILL_DIR}/reports/

Instructions

  1. Inventory all available security data sources by scanning ${CLAUDE_SKILL_DIR}/security/ for scanner outputs, log files, and configuration exports.
  2. Parse vulnerability findings and normalize severity using CVSS 3.1 base scores: Critical (9.0-10.0), High (7.0-8.9), Medium (4.0-6.9), Low (0.1-3.9).
  3. Cross-reference each finding against applicable compliance controls. Map to specific PCI-DSS requirements (e.g., Req 6.5 for injection flaws), HIPAA safeguards, or SOC 2 Common Criteria.
  4. Deduplicate findings across scanners and merge related vulnerabilities into consolidated entries with all affected assets listed.
  5. Classify access control weaknesses, encryption gaps, and authentication deficiencies into separate report sections.
  6. Generate an executive summary including total findings by severity, overall risk score, and top-5 critical remediation priorities.
  7. Build a detailed findings table: finding ID, CWE number, affected component, CVSS score, compliance mapping, remediation steps, and evidence links.
  8. Produce a compliance status matrix showing pass/fail/partial for each applicable standard requirement.
  9. Create remediation recommendations with effort estimates (hours), priority ranking, and suggested timelines.
  10. Format the final report as Markdown to ${CLAUDE_SKILL_DIR}/reports/security-audit-YYYYMMDD.md. Optionally produce JSON for Jira/ServiceNow import.

See ${CLAUDE_SKILL_DIR}/references/implementation.md for the detailed four-phase implementation workflow.

Output

  • Audit Report: ${CLAUDE_SKILL_DIR}/reports/security-audit-YYYYMMDD.md containing executive summary, detailed findings, compliance matrix, and remediation plan
  • Findings JSON: Machine-readable findings for ticketing system import
  • Compliance Matrix: Per-requirement pass/fail/partial status for each applicable framework
  • Remediation Backlog: Prioritized list with effort estimates and owner assignments

Error Handling

ErrorCauseSolution
No security scan results foundScanner outputs missing from ${CLAUDE_SKILL_DIR}/security/Specify alternate data source paths or run preliminary scans with nmap -sV or trivy fs .
Cannot assess compliance -- requirements unavailableCompliance framework checklist not providedFall back to OWASP Top 10 and CWE Top 25 as baseline; note limitation in report
Permission denied reading config filesInsufficient filesystem accessRequest elevated permissions or provide exported configuration snapshots
Scan results exceed processing capacityThousands of findings from multiple scannersProcess in batches by severity (Critical/High first), then merge
Conflicting severity ratings across scannersDifferent tools score the same vulnerability differentlyUse CVSS 3.1 base score as canonical severity; note discrepancies in appendix

Examples

  • "Generate a SOC 2 security audit report for the API using scan results in ${CLAUDE_SKILL_DIR}/security/."
  • "Create a PCI-DSS compliance-focused security assessment with a prioritized remediation plan for all Critical and High findings."
  • "Produce a HIPAA security audit from the Nessus and Trivy outputs, mapping each finding to the relevant HIPAA safeguard."

Resources

Stats
Stars1669
Forks210
Last CommitMar 11, 2026

Similar Skills