From digital-innovation-agents
Audits full codebase for security issues via SAST, OWASP Top 10/LLM Top 10, SCA, Zero Trust validation, code quality; outputs prioritized report with remediation plan.
npx claudepluginhub pssah4/digital-innovation-agents --plugin digital-innovation-agentsThis skill uses the workspace's default tool permissions.
You perform a comprehensive security audit covering dependency analysis
Audits code for security vulnerabilities including OWASP Top 10, auth flaws, injection, data exposure, and dependency risks using STRIDE threat modeling and phased reviews.
Scans local projects for dependency vulnerabilities (SCA), code security patterns (SAST), leaked secrets, auth/crypto flaws, misconfigs, supply chain risks, CI/CD issues. Generates prioritized report with remediation guidance.
Orchestrates repo security scans (SAST, SCA, secrets, config) with adaptive agent swarms: subagents for small repos, teams for large. Verifies findings, compiles reports.
Share bugs, ideas, or general feedback.
You perform a comprehensive security audit covering dependency analysis through to code review. Your output is a prioritized security report with a concrete remediation plan.
Input: Codebase (src/), dependencies (package.json/pyproject.toml), configuration
Output: Security Audit Report in _devprocess/analysis/AUDIT-{PROJECT}-{YYYY-MM-DD}.md
Writing style for every artifact this skill produces: Follow the rules in skills/project-conventions/SKILL.md under "Writing style for every artifact". Zero em dashes of any form. No Unicode em dash (U+2014), no en dash (U+2013), no double-hyphen substitute. No AI vocabulary, no negative parallelisms. Every finding description, every causal chain, every remediation step, and every prioritisation rationale is written in that style. Before you save an artifact, scan it for U+2014 and U+2013 and fix any hit.
Security audits run in two modes:
feature/audit-<YYYY-MM-DD> and produces a
standalone AUDIT report that queues FIX/IMP follow-ups.For per-item audit:
Identify the active item from the prompt or via AskUserQuestion.
Verify the branch matches the item-branch.
Skill-triggered GitHub integration (idempotent):
python3 tools/github-integration/flow.py create-issue --item <ID>
python3 tools/github-integration/flow.py open-draft-pr --item <ID>
At Handoff Ritual end, tag the phase:
python3 tools/github-integration/flow.py tag-phase --item <ID> --phase audit
For periodic full-codebase audit: branch is
feature/audit-<YYYY-MM-DD> (no item ID). The AUDIT report acts as
its own deliverable; FIX/IMP follow-ups land in the BACKLOG, each
with its own branch later. No draft PR is opened for the audit
branch itself; the audit report is a deliverable, the FIX/IMP
follow-ups are the actionable work and they get their own branches
later via /coding.
Full rules: skills/project-conventions/references/team-workflow.md.
/architecture)Read and understand the tech stack:
Project analysis:
- Language(s): {identify}
- Framework(s): {identify}
- Runtime: {identify}
- Dependencies: {count}
- Code size: {files, LOC}
- Existing security measures: {what's already in place}
Systematically check the code. Read references/cwe-patterns.md for the
full list of grep/analysis patterns per CWE category.
For each finding, document according to the Finding format in
templates/AUDIT-TEMPLATE.md: Severity, CWE-ID, Location (file:line),
Risk, Remediation, Code diff.
Check all 10 categories (A01-A10). Read references/owasp-checklist.md.
Only relevant if the project uses LLM APIs. Check LLM01-LLM10.
Read references/owasp-llm-checklist.md.
# Dependency vulnerabilities
npm audit --json 2>/dev/null || pip-audit --format json 2>/dev/null
# License check
npx license-checker --json 2>/dev/null || pip-licenses --format json 2>/dev/null
Classify by: Runtime Dependencies (critical), Dev Dependencies (lower risk), Transitive Dependencies (indirect risk).
Check: Input validation at trust boundaries, Least Privilege, Defense in Depth, Fail-Closed Defaults, Audit Trail, Error Handling, Resource Management, Race Conditions, Hardcoded Credentials, Debug code in production.
Read templates/AUDIT-TEMPLATE.md and create the full report.
Save to: _devprocess/analysis/AUDIT-{PROJECT}-{YYYY-MM-DD}.md
Don't mark false positives silently:
Remediation too vague:
src/api/handler.ts:42, replace JSON.parse(userInput) with
schema validation using zod"Don't forget positive findings:
After the audit, a fix-loop starts. The user decides scope and approach.
=== Security Audit Result ===
Overall risk: {Critical / High / Medium / Low}
P1 -- Must Fix (Critical + High): {N} findings
- {H-1}: {title} -- {file:line} -- effort: {S/M/L}
- {H-2}: {title} -- {file:line} -- effort: {S/M/L}
P2 -- Should Fix (Medium): {N} findings
- {M-1}: {title} -- {file:line} -- effort: {S/M/L}
P3 -- Consider (Low + Info): {N} findings
- {L-1}: {title} -- effort: {S/M/L}
Positive findings: {what is already well implemented}
How should I handle the findings?
A) Fix all findings (P1 + P2 + P3)
-> I fix everything and run a re-audit
B) Fix only P1, defer P2/P3 to backlog
-> Critical/High fixed immediately, rest documented
C) Approve fixes one by one
-> I show each fix before implementation
D) Nothing to fix -- report only
-> All findings go to the backlog
For each finding to be fixed:
Confirmed -> ResolvedAfter all fixes: re-run the affected audit phases.
=== Re-Audit Result ===
Before: {N} P1, {N} P2, {N} P3
After: {N} P1, {N} P2, {N} P3
Resolved: {list of fixed findings}
New: {if a fix introduced new findings}
{If P1 still open: back to step 2}
{If P1 all resolved:}
All Critical/High findings resolved!
The loop repeats until all in-scope findings are resolved or the user aborts.
Findings not fixed immediately (e.g. P2/P3 on Option B):
Backlog: each open finding gets a row in
_devprocess/context/BACKLOG.md following the binding format
from skills/requirements-engineering/templates/BACKLOG-TEMPLATE.md.
Security findings live in the Standalone Items section with:
Typ = SecuritySource = SECPrio mapped from finding severity (H -> P1, M -> P2, L -> P3)Status = PlannedEvidence = path:lineNotes = finding ID (H-N / M-N / L-N) + short risk description
After adding rows, refresh the dashboard counts and "Letztes Update".Audit report: status stays Confirmed with note "Deferred to backlog"
/consistency-check mode A at the end of the skill phaseCatches deferred findings without backlog rows, FIX rows missing
feature: / epic: frontmatter, dashboard counts that drifted from
the new findings, and dead links between audit report and backlog.
The Handoff Ritual reports the result.
Security Audit complete!
Resolved: {N} findings fixed
Deferred: {N} findings in backlog
Report: _devprocess/analysis/AUDIT-{PROJECT}-{DATE}.md
After the fix-loop is closed, this skill always runs the handoff ritual,
regardless of how it was started (directly or via /dia-guide).
Produced / updated:
- _devprocess/analysis/AUDIT-{PROJECT}-{DATE}.md: full report
- Findings resolved: {N} (P1: {N}, P2: {N}, P3: {N})
- Findings deferred: {N} (in backlog)
- _devprocess/context/BACKLOG.md: deferred findings added
Append a new entry to _devprocess/context/HANDOFFS.md with:
/architecture cycle (e.g. trust-boundary issues that
require redesign, not patching)/consistency-check mode B + optional release)Run the phase-end commit per skills/project-conventions/references/team-workflow.md
section "Phase-end commit (binding)". The block fires the binding
branch-and-item check, stages every artefact this phase produced
(audit report, BACKLOG rows for deferred findings, any FIX rows
created from H/M findings), commits with the canonical message,
sets the phase tag, and opens a draft PR if one does not exist yet.
Canonical commit message for AUDIT:
chore(audit): <ITEM-ID> audit complete
<one-line summary: risk verdict, N findings (P1/P2/P3), release recommendation>
Refs: <ITEM-ID>[, FIX-..., FIX-...]
After the commit lands, run:
python3 tools/github-integration/flow.py tag-phase --item <ID> --phase audit
Skip the commit silently if the working tree has no changes.
Ask the user:
"Security audit complete. Report saved to:
_devprocess/analysis/AUDIT-{PROJECT}-{DATE}.mdRelease readiness: {green/yellow/red}
Recommended next:
/consistency-checkmode B (semantic) -- finalises the artifact graph (BA Validation, Feature/ADR statuses, arc42, plan-context) and returns a Release-Ready verdict. After Release- Ready: yes, the cycle is closed; you can run your private release skill if one is configured.Shall I invoke
/consistency-checkmode B now, or would you like to review the audit first?"
On agreement ("yes" / "go" / "next") or when running inside
/dia-guide:
-> Run /consistency-check mode B; on Release-Ready: yes the
/dia-guide Closing Handoff fires
On rejection ("no" / "stop" / "I want to check first"): -> Pause and wait for user instruction
Security Audit, Security Review, OWASP, SAST, SCA, Vulnerability, CVE, Threat Model, Dependency Audit, Code Review Security, Fix-Loop, Handoff