npx claudepluginhub mbwsims/claude-universe --plugin universeThis skill is limited to using the following tools:
Scan code for security vulnerabilities. Goes beyond surface-level checks ("don't use eval")
Scans codebases for vulnerabilities like injections, XSS, secrets exposure, insecure deps, and access control flaws across JavaScript, TypeScript, Python, Java, PHP, Go, Ruby, Rust.
Scans code for hardcoded secrets like API keys, SQL injection, XSS, insecure dependencies via npm/pip/cargo audits, and OWASP Top 10 issues using grep and bash.
Scans codebases for vulnerabilities like SQL injection, XSS, auth flaws, insecure deps, and secrets using grep and bash. Generates severity-rated reports with file locations, explanations, and fixes.
Share bugs, ideas, or general feedback.
Scan code for security vulnerabilities. Goes beyond surface-level checks ("don't use eval") into the structural vulnerabilities that cause real breaches: auth bypass, injection, IDOR, mass assignment, insecure defaults, race conditions, and secret exposure.
Claude's default security awareness catches obvious issues but misses the non-obvious ones that attackers actually exploit. This skill provides the methodology to find them.
If a specific file or directory was provided, focus there. Otherwise, identify the security-critical surfaces:
Prioritize by attack surface: externally-reachable code first, internal code second.
With shieldkit-mcp (preferred): Call shieldkit_scan to get deterministic pattern
detection — SQL injection, missing auth, hardcoded secrets, dangerous functions, CORS
misconfigurations. Use the structured findings as the foundation, then supplement with
semantic analysis for issues the tool cannot detect (logic flaws, broken access control
that requires understanding business rules, race conditions).
Without shieldkit-mcp: For each file in scope, manually check against the vulnerability
categories in references/vulnerability-catalog.md. Note to the user: "Running without
shieldkit-mcp — analysis will use manual pattern matching."
For each vulnerability found:
Grep for patterns that indicate exposed secrets:
.env files committed to git (check .gitignore)Run the appropriate dependency audit command for the project's ecosystem:
npm audit --json or yarn audit --json -- check for known CVEspip audit (install via pip install pip-audit) -- checks PyPI advisoriescargo audit (install via cargo install cargo-audit) -- checks RustSec DBgovulncheck ./... -- checks Go vulnerability databasebundle audit check (install via gem install bundler-audit)If the audit tool is not installed, note the command for the user to run manually.
Additionally:
Report format:
## Security Scan — {scope}
{n} vulnerabilities found: {critical} critical, {high} high, {medium} medium, {low} low
### Critical
1. **SQL Injection** — `{file}:{line}`
Code: `db.query(\`SELECT * FROM users WHERE id = ${userId}\`)`
Attack: Attacker sends `userId = "1; DROP TABLE users"` via API
Fix: Use parameterized queries: `db.query("SELECT * FROM users WHERE id = $1", [userId])`
### High
2. **Missing Auth Check** — `{file}:{line}`
...
### Medium
...
### Secrets
{Any exposed secrets found}
### Dependencies
{Any vulnerable or outdated dependencies}
### Not Vulnerable
{Explicitly list what was checked and found secure. Examples:}
- SQL queries: All database access in `src/db/` uses parameterized queries via Prisma
- Auth: All API routes in `src/routes/` have authentication middleware
- CORS: Configuration restricts origins to `https://app.example.com`
- Secrets: No hardcoded credentials found; all secrets loaded via env vars
{This section builds confidence that the scan was thorough and helps developers
understand what does NOT need attention.}
Order findings by severity (Critical → High → Medium → Low). Within each severity, order by exploitability (externally reachable > internal only).
/threat-model — Use on high-risk findings to assess broader attack patterns/security-review — Use for attacker-minded analysis of specific filesreferences/vulnerability-catalog.md — Full vulnerability catalog organized by
OWASP Top 10 + modern web categories, with detection patterns and fix templates