From secure-sdlc-agents
Enforces security checklists and PR reviews for code handling user input, authentication, access control, cryptography, error handling, file uploads, and dependencies. Covers OWASP Top 10 and ASVS.
npx claudepluginhub kaademos/secure-sdlc-agents --plugin secure-sdlc-agentsThis skill uses the workspace's default tool permissions.
This skill enforces the secure coding standards and PR review discipline that prevent
Review code systematically for security vulnerabilities using OWASP Top 10, secure coding patterns, and static analysis best practices. Use when reviewing pull requests, conducting security code reviews, or implementing secure development practices.
Mandates invoking relevant skills via tools before any response in coding sessions. Covers access, priorities, and adaptations for Claude Code, Copilot CLI, Gemini CLI.
Share bugs, ideas, or general feedback.
This skill enforces the secure coding standards and PR review discipline that prevent the most common vulnerability classes from reaching production. It covers OWASP Top 10 categories, ASVS control requirements, and the review process that catches issues before they merge — not after they breach.
Before reviewing, identify which categories are in scope:
| Surface | Key risks |
|---|---|
| Input handling | Injection (SQL, LDAP, OS command, template, XSS) |
| Authentication | Weak passwords, missing MFA, session fixation |
| Access control | IDOR, broken object-level auth, privilege escalation |
| Cryptography | Weak algorithms, hardcoded keys, improper key storage |
| File handling | Path traversal, type confusion, SVG XSS, unrestricted upload |
| Dependencies | Known CVEs, unmaintained packages, licence risk |
| Error handling | Stack trace leakage, verbose error messages |
docs/security-requirements.md are satisfied| Severity | Action |
|---|---|
| CRITICAL | Block merge immediately. No exceptions. Fix and re-review. |
| HIGH | Block merge unless risk is formally accepted with CISO sign-off. |
| MEDIUM | Must have fix or accepted-risk entry in risk register before release. |
| LOW / INFO | Track in risk register. Does not block. |
## Security Review: PR #[N] — [Title]
### CRITICAL / HIGH — Block merge
- [Issue]: [Plain English description + CWE reference + concrete fix]
### MEDIUM — Fix before release
- [Issue]: [Description + remediation suggestion]
### Positive observations
- [Good security practice observed — reinforce it]
After remediation:
docs/sast-findings.md with the resolution status.| Excuse | Counter |
|---|---|
| "It's internal-only, not a real risk" | Internal endpoints are breached via SSRF, pivot attacks, and insider threat. Internal ≠ safe. |
| "I'll add input validation later" | Injection vulnerabilities are introduced at write time. "Later" is too late once it ships. |
| "The ORM handles SQL injection" | ORMs do not protect against raw queries, JSON operators, or second-order injection. Verify. |
| "We'll rotate the hardcoded key before production" | Keys committed to git are already compromised. Rotate now; remove from history. |
| "This dependency vulnerability isn't reachable" | Reachability analysis is hard. Upgrade unless you can prove the affected code path is never hit. |
| "The client validates it too" | Client-side validation is UX. Server-side validation is security. Both are required. |
eval(), exec(), subprocess.run(shell=True) with user-controlled dataAuthorization header or session token logged anywherecatch (e) {} — swallowed errors that may be masking a security eventDo not close this review until:
docs/sast-findings.md is updated with finding statusdocs/risk-register.md is updated if any risk was accepted