From devflow
Use when assessing security of code, APIs, or infrastructure — OWASP-based review with severity classification
npx claudepluginhub nexuz-sys/devflow --plugin devflowThis skill uses the workspace's default tool permissions.
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Searches prompts.chat for AI prompt templates by keyword or category, retrieves by ID with variable handling, and improves prompts via AI. Use for discovering or enhancing prompts.
Executes pre-written implementation plans: critically reviews, follows bite-sized steps exactly, runs verifications, tracks progress with checkpoints, uses git worktrees, stops on blockers.
Structured security assessment based on OWASP Top 10 with project-context awareness.
Announce at start: "I'm using the devflow:security-audit skill."
* in production)file://, gopher://)| Severity | Criteria | Action |
|---|---|---|
| CRITICAL | Exploitable now, data at risk | Block merge, fix immediately |
| HIGH | Significant risk, requires specific conditions | Fix before merge |
| MEDIUM | Moderate risk, defense-in-depth gap | Fix in current sprint |
| LOW | Minor risk, best-practice deviation | Track, fix when nearby |
## Security Audit: [feature/scope]
### Findings
#### [CRITICAL] SQL Injection in user search
- **Location:** src/api/users.ts:42
- **Issue:** User input concatenated into SQL query
- **Impact:** Full database access
- **Fix:** Use parameterized query
#### [HIGH] Missing auth check on admin endpoint
...
### Summary
- Critical: N | High: N | Medium: N | Low: N
- **Recommendation:** BLOCK / FIX / PASS
agent({ action: "orchestrate", agents: ["security-auditor"], task: "<description>" })
skill({ action: "getContent", skill: "security-audit" })
Read .context/agents/security-auditor.md and .context/skills/security-audit/SKILL.md.
| Pattern | Problem |
|---|---|
| "We'll add security later" | Security is cheapest at design time, most expensive in production |
| Only checking the happy path | Attackers don't use your UI the way users do |
| Trusting client-side validation | Everything client-side can be bypassed |
| Security through obscurity | Hidden URLs/endpoints are still discoverable |
| Logging sensitive data "for debugging" | Logs get leaked, stored indefinitely, shared broadly |