From security-research
Report generation methodology for security audits. Handles mode detection (pipeline vs standalone), custom template support, and produces a professional report with executive summary, findings table, vulnerability chains, and remediation roadmap.
npx claudepluginhub pucagit/claude-plugin --plugin security-researchThis skill uses the workspace's default tool permissions.
Transform security findings into a polished, professional report suitable for both technical teams and executive stakeholders. Handles two modes: pipeline (from a completed audit workspace) and standalone (from user-supplied findings).
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
Transform security findings into a polished, professional report suitable for both technical teams and executive stakeholders. Handles two modes: pipeline (from a completed audit workspace) and standalone (from user-supplied findings).
Triggered when: AUDIT_DIR exists with findings/VULN-*/VULN-*.md files.
Triggered when: User provides finding descriptions directly (pasted text, file paths, verbal descriptions) without a full audit workspace.
For standalone mode:
{AUDIT_DIR}/findings/ if neededfindings/VULN-NNN/VULN-NNN.md — formatted using standard templatefindings/VULN-NNN/poc/ — write any PoC code, requests, responses providedExecute in this order:
{AUDIT_DIR}/logs/scope_brief.md (if exists)ls {PROJECT_DIR}/REPORT.mdls {AUDIT_DIR}/findings/VULN-*/VULN-*.mdrecon/intelligence.md, recon/architecture.md, recon/attack-surface.mdIf {PROJECT_DIR}/REPORT.md exists: Read it entirely. Use its structure, sections, headings, and formatting as the template. Fill each section with data from findings. If a template section has no applicable data, include it with "N/A" or "No findings in this category." Preserve the template's ordering and style.
If no REPORT.md: Use the default format below.
If scope_brief.md exists and has report_requirements:
Warning: Program requires video/screenshots before submissionnon_qualifying_vulns or out_of_scopeWrite to {AUDIT_DIR}/report.md:
# Security Assessment Report
## Executive Summary
[For non-technical executives. Business impact — financial, regulatory, operational. No jargon.]
### Engagement Overview
- **Target**: [system name and type]
- **Assessment Period**: [dates]
- **Scope**: [what was tested]
- **Methodology**: Semantic code analysis, automated scanning (Semgrep), manual code review, [live testing if applicable]
### Risk Summary
| Severity | Count | Key Findings |
|---|---|---|
| Critical | N | [brief description] |
| High | N | [brief description] |
| Medium | N | |
| Low | N | |
### Top Recommendations
1. [Most urgent action]
2. [Second priority]
3. [Third priority]
### Positive Observations
[Security controls that were well-implemented]
---
## Findings Summary
| ID | Title | Severity | CVSS | CWE | Status |
|---|---|---|---|---|---|
| [VULN-NNN](findings/VULN-NNN/VULN-NNN.md) | Title | CRITICAL | 9.8 | CWE-89 | CONFIRMED |
> Full finding details in each linked file. PoC scripts and evidence in each finding's `poc/` subdirectory.
---
## Vulnerability Chains
[Multi-step attack chains. For each: steps, combined impact, prerequisites.
If none identified, state "No multi-step vulnerability chains identified."]
---
## Scope & Methodology
- **Standards Referenced**: OWASP Testing Guide v4.2, OWASP Top 10 2021, CWE/SANS Top 25, CVSS v3.1
- **Tools Used**: Semgrep (SAST), manual semantic code review, [others]
- **Assessment Approach**: Skills-driven analysis — reconnaissance, variant analysis, deep semantic code review, automated pattern detection, adversarial verification
- **Limitations**: [any scope exclusions, time constraints, or access limitations]
---
## Remediation Roadmap
### Priority 1 — Immediate (Critical/High)
| Finding | Action | Effort | Risk if Unpatched |
|---|---|---|---|
### Priority 2 — Short-term (Medium)
| Finding | Action | Effort |
|---|---|---|
### Priority 3 — Hardening (Low/Informational)
| Finding | Action |
|---|---|
### Architectural Recommendations
[Systemic improvements beyond individual fixes]
---
## Appendix: Tool Inventory
| Tool | Purpose | Findings Attributed |
|---|---|---|
file:line — never use vague referencesVULN-NNN identifiers consistently throughoutreport.md MUST be >= 50 lines## Executive Summary heading## Remediation Roadmap section