From security
Security audit of application code — OWASP Top 10, injection vectors, auth flaws, data exposure
npx claudepluginhub silviaare95/xari-plugins --plugin securityThis skill uses the workspace's default tool permissions.
Implements structured self-debugging workflow for AI agent failures: capture errors, diagnose patterns like loops or context overflow, apply contained recoveries, and generate introspection reports.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Audit: $0
Focus: $1 (default: all)
dangerouslySetInnerHTML?exec, spawn, eval?../../../etc/passwd)SELECT * instead of specific fields?.env in .gitignore?*)?npm audit)## Security Audit: <target>
### Risk Summary
- **Critical**: X (exploit possible)
- **High**: Y (vulnerability exists, exploit requires effort)
- **Medium**: Z (defense-in-depth gap)
- **Low**: W (hardening opportunity)
### Critical Findings
1. **<vulnerability type>** — <file:line>
- **Risk**: <what an attacker can do>
- **Fix**: <specific code change>
- **Verify**: <how to test the fix>
### High Findings
...
### Hardening Recommendations
1. <recommendation>