From agents
Proactive security assessment with SAST, secrets detection, dependency scanning, and compliance checks. Use for pre-deployment audit. NOT for code review (honest-review) or pen testing.
npx claudepluginhub wyattowalsh/agents --plugin agentsThis skill uses the workspace's default tool permissions.
Proactive pre-deployment security assessment. SAST pattern matching, secrets detection,
data/cwe-common.jsondata/owasp-top-10.jsondata/secrets-patterns.jsonevals/compliance-mode.jsonevals/explicit-scan.jsonevals/full-scan.jsonevals/implicit-trigger.jsonevals/negative-control.jsonreferences/compliance-checklists.mdreferences/cwe-patterns.mdreferences/dependency-audit.mdreferences/owasp-patterns.mdreferences/scope-boundary.mdreferences/secrets-guide.mdreferences/triage-protocol.mdscripts/compliance-scorer.pyscripts/dependency-checker.pyscripts/sarif-formatter.pyscripts/secrets-detector.pytemplates/dashboard.htmlCreates isolated Git worktrees for feature branches with prioritized directory selection, gitignore safety checks, auto project setup for Node/Python/Rust/Go, and baseline verification.
Executes implementation plans in current session by dispatching fresh subagents per independent task, with two-stage reviews: spec compliance then code quality.
Dispatches parallel agents to independently tackle 2+ tasks like separate test failures or subsystems without shared state or dependencies.
Proactive pre-deployment security assessment. SAST pattern matching, secrets detection, dependency scanning, OWASP/CWE mapping, and compliance heuristics.
Scope: Pre-deployment security audit only. NOT for code review (use honest-review), penetration testing, runtime security monitoring, or supply chain deep analysis.
| Term | Definition |
|---|---|
| finding | A discrete security issue with severity, CWE mapping, confidence, and remediation |
| severity | CRITICAL / HIGH / MEDIUM / LOW / INFO classification per CVSS-aligned heuristics |
| confidence | Score 0.0-1.0 per finding; >=0.7 report, 0.3-0.7 flag as potential, <0.3 discard |
| CWE | Common Weakness Enumeration identifier mapping the finding to a known weakness class |
| OWASP | Open Web Application Security Project Top 10 category mapping |
| SAST | Static Application Security Testing — pattern-based source code analysis |
| secret | Hardcoded credential, API key, token, or private key detected in source |
| lockfile | Dependency manifest with pinned versions (package-lock.json, uv.lock, etc.) |
| compliance | Lightweight heuristic scoring against SOC2/GDPR/HIPAA controls |
| triage | Risk-stratify files by security relevance before deep scanning |
| remediation | Specific fix guidance with code examples when applicable |
| SARIF | Static Analysis Results Interchange Format for CI integration |
| false positive | Detection matching a pattern but not an actual vulnerability |
| $ARGUMENTS | Mode | Action |
|---|---|---|
| Empty | scan | Full codebase security scan with triage/sampling |
scan [path] | scan | Full security scan of path (default: cwd) |
check <file/dir> | check | Targeted security check on specific files |
deps [path] | deps | Dependency lockfile analysis |
secrets [path] | secrets | Secrets-only regex scan |
compliance <standard> | compliance | SOC2/GDPR/HIPAA heuristic checklist |
report | report | Dashboard visualization of findings |
| Unrecognized input | — | Ask for clarification |
Full codebase security assessment with triage and sampling for large codebases.
find or Glob to build file inventoryRead HIGH and sampled MEDIUM/LOW files. Match against patterns from references/owasp-patterns.md:
Run: uv run python skills/security-scanner/scripts/secrets-detector.py <path>
Parse JSON output. Cross-reference findings with .gitignore coverage.
If lockfiles exist, run: uv run python skills/security-scanner/scripts/dependency-checker.py <path>
Parse JSON output. Flag outdated or unmaintained dependencies.
Map each finding to CWE IDs and OWASP Top 10 categories using references/cwe-patterns.md.
Assign severity (CRITICAL/HIGH/MEDIUM/LOW/INFO) and confidence (0.0-1.0).
For each finding with confidence >= 0.7, provide:
Present findings grouped by severity. Include:
Targeted security check on specific files or directories.
Dependency lockfile analysis.
package-lock.json, yarn.lock, pnpm-lock.yaml, requirements.txt, uv.lock, Cargo.lock, go.sum, Gemfile.lock, composer.lockuv run python skills/security-scanner/scripts/dependency-checker.py <path>Secrets-only scan using regex patterns.
uv run python skills/security-scanner/scripts/secrets-detector.py <path>.gitignore — flag secrets in tracked files as CRITICALgit log --diff-filter=D -p -- <file>Lightweight compliance heuristic scoring.
<standard> is one of: soc2, gdpr, hipaauv run python skills/security-scanner/scripts/compliance-scorer.py <path> --standard <standard>references/compliance-checklists.mdGenerate visual security dashboard.
uv run python skills/security-scanner/scripts/sarif-formatter.pytemplates/dashboard.html| Scope | Strategy |
|---|---|
| 1-10 files | Direct scan, no triage |
| 11-100 files | Triage + prioritized scan |
| 100-500 files | Triage + sampling (all HIGH, 50% MEDIUM, 10% LOW) |
| 500+ files | Triage + sampling + parallel subagents by risk tier |
Load ONE reference at a time. Do not preload all references into context.
| File | Content | Read When |
|---|---|---|
| references/owasp-patterns.md | OWASP Top 10 with code patterns and detection heuristics | During SAST scan (Step 2) |
| references/cwe-patterns.md | Top 50 CWEs with detection patterns and remediation | During CWE mapping (Step 5) |
| references/secrets-guide.md | Secret patterns, false positive hints, triage guidance | During secrets scan |
| references/dependency-audit.md | Dependency audit protocol and CVE lookup workflow | During deps mode |
| references/compliance-checklists.md | SOC2/GDPR/HIPAA control checklists with scoring | During compliance mode |
| references/triage-protocol.md | Risk stratification methodology for security files | During triage (Step 1) |
| references/scope-boundary.md | Boundary with honest-review, pen testing, runtime monitoring | When scope is unclear |
| Script | When to Run |
|---|---|
| scripts/secrets-detector.py | Secrets scan — regex-based detection |
| scripts/dependency-checker.py | Dependency analysis — lockfile parsing |
| scripts/sarif-formatter.py | SARIF conversion — CI integration output |
| scripts/compliance-scorer.py | Compliance scoring — heuristic checklist |
| Template | When to Render |
|---|---|
| templates/dashboard.html | After scan — inject findings JSON into data tag |