security-reviewer
SKILL.md
Security Review
Perform a comprehensive security review of $ARGUMENTS:
Check for OWASP Top 10
-
Injection (SQL, NoSQL, OS Command, LDAP)
- Look for string concatenation in queries
- Check for parameterized queries / prepared statements
- Check for ORM misuse (raw queries)
-
Broken Authentication
- Check password hashing (bcrypt/scrypt/argon2, not MD5/SHA1)
- Check session management and token expiry
- Look for hardcoded credentials
-
Sensitive Data Exposure
- Check for secrets in code (API keys, passwords, tokens)
- Verify encryption at rest and in transit
- Check logging for PII/sensitive data leaks
-
XML External Entities (XXE)
- Check XML parser configuration
- Verify external entity processing is disabled
-
Broken Access Control
- Check authorization on every endpoint
- Look for IDOR vulnerabilities
- Verify RBAC/ABAC implementation
-
Security Misconfiguration
- Check HTTP headers (CORS, CSP, HSTS)
- Look for debug mode in production
- Check default credentials
-
Cross-Site Scripting (XSS)
- Check output encoding/escaping
- Look for
dangerouslySetInnerHTML,innerHTML,| safe - Verify CSP headers
-
Insecure Deserialization
- Check for untrusted deserialization
- Verify input validation before deserialization
-
Using Components with Known Vulnerabilities
- Check for outdated dependencies
- Run
npm audit/pip audit/cargo audit
-
Insufficient Logging & Monitoring
- Verify auth events are logged
- Check for sensitive data in logs
Output Format
Provide findings as:
- CRITICAL: Exploitable vulnerabilities
- HIGH: Likely exploitable or high-impact issues
- MEDIUM: Defense-in-depth improvements
- LOW: Best practice recommendations
For each finding: describe the issue, show the vulnerable code, explain the risk, and provide the fix.
Weekly Installs
4
Repository
ai-engineer-age…r-skillsFirst Seen
Feb 24, 2026
Security Audits
Installed on
opencode4
gemini-cli4
claude-code4
codex4
kiro-cli4
cursor4