Identify security vulnerabilities using SAST methodology with MCP tools for code scanning. Use when reviewing code security, analyzing vulnerabilities, auditing changes, or when user mentions security, vulnerabilities, SQL injection, XSS, authentication, secrets, or security audit.
Performs security vulnerability analysis using SAST methodology to identify hardcoded secrets, injection flaws, broken access control, and authentication issues. Triggers when reviewing code security, analyzing vulnerabilities, auditing changes, or when user mentions security, vulnerabilities, SQL injection, XSS, authentication, secrets, or security audit.
/plugin marketplace add pleaseai/security-plugin/plugin install gemini-cli-security@pleaseaiThis skill is limited to using the following tools:
Expert security analysis following senior security engineer methodology.
dangerouslySetInnerHTML with unsanitized input| Level | Impact | Examples |
|---|---|---|
| Critical | RCE, full compromise, data exfiltration | SQL→RCE, hardcoded root creds |
| High | Read/modify sensitive data, DoS | Stored XSS, IDOR on critical data |
| Medium | Limited data access, requires interaction | Reflected XSS, PII in logs |
| Low | Minimal impact, complex exploit | Verbose errors, limited path traversal |
Each finding must include:
Before reporting, verify:
ALL must be YES to report.
Offer users:
/security:analyze for automated comprehensive scanUse MCP tools (scan_file, analyze_code) or READ-ONLY tools for analysis.
For complete methodology, see GEMINI.md
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.