skills/bitwarden/ai-plugins/perform-security-review

perform-security-review

Installation
SKILL.md

Parameters

--output-dir <path>: When using --output file, write the report to <path>/security-review-YYYY-MM-DD-{identifier}.md instead of the current working directory. Tip: use --output-dir ~/.claude/security-reviews/ to keep reports outside git repos.

Security Review Mode

Determine review mode from the invocation:

  • PR mode (PR number or URL): gh pr view <number> for context, gh pr diff <number> for the diff.
  • Commit mode (commit SHA): git diff <sha>..HEAD — reviews all changes after that commit.
  • Time-based mode (duration, e.g., "last 48 hours"): find the oldest commit in range with git log --since="<duration>" --reverse --format=%H | head -1, then git diff <sha>^..HEAD to include it.
  • Local changes mode (no argument, pending changes exist): git diff HEAD for staged + unstaged changes.
  • Branch comparison mode (no argument, no pending changes): git diff main...HEAD — changes since the branch diverged from main.

Security Review Process

Model selection: If --model is specified, use that model for all agents. Otherwise, default to opus.

Execute these steps in order. Do not skip, reorder, or combine steps.

  1. Gather context. Run all of these before launching any agents.

    ** A.) Resolve repo identity.** Run as two separate Bash calls — do NOT chain with &&, ||, ;, or pipes:

    • git remote get-url origin — parse owner and repo from the output. Handle both HTTPS (https://github.com/owner/repo.git) and SSH (git@github.com:owner/repo.git) formats.
    • git branch --show-current — capture the current branch name.

    B.) Fetch and save the diff. Using the review mode determined above, run exactly one of these commands as a single Bash call — no &&, ;, or pipes. Shell redirection (>) is required and allowed:

    • PR mode: gh pr diff <number> > /tmp/security-review-<identifier>.diff
    • Commit mode: git diff <sha>..HEAD > /tmp/security-review-<identifier>.diff
    • Time-based mode: git diff <oldest-sha>^..HEAD > /tmp/security-review-<identifier>.diff
    • Local changes mode: git diff HEAD > /tmp/security-review-<identifier>.diff
    • Branch comparison mode: git diff main...HEAD > /tmp/security-review-<identifier>.diff

    Choose a descriptive <identifier> (e.g., PR123, 5days, local). Store the full path as DIFF_FILE and include it in every agent prompt in steps 2 and 4 so they can Read the diff directly.

    C.) Fetch scan evidence. All calls are best-effort — silently skip any that fail (403, 404, empty response, GHAS not enabled). Use gh api --jq for all formatting — DO NOT pipe to jq. All calls MUST use --method GET and -H "X-GitHub-Api-Version: 2026-03-10".

    • Code scanning (PR mode): gh api --method GET -H "X-GitHub-Api-Version: 2026-03-10" "repos/{owner}/{repo}/code-scanning/alerts?pr={number}&state=open&per_page=100" --jq '.[] | "\(.rule.security_severity_level | ascii_upcase) | \(.most_recent_instance.message.text) | \(.most_recent_instance.location.path)\n \(.rule.full_description | .[0:150])\n"'
    • Code scanning (all other modes): gh api --method GET -H "X-GitHub-Api-Version: 2026-03-10" "repos/{owner}/{repo}/code-scanning/alerts?ref=refs/heads/{branch}&state=open&per_page=100" --jq '.[] | "\(.rule.security_severity_level | ascii_upcase) | \(.most_recent_instance.message.text) | \(.most_recent_instance.location.path)\n \(.rule.full_description | .[0:150])\n"'
    • Secret scanning: gh api --method GET -H "X-GitHub-Api-Version: 2026-03-10" "repos/{owner}/{repo}/secret-scanning/alerts?state=open" --jq '.[] | "\(.secret_type_display_name) | \(.state) | \(.resolution // "open")"'
    • Dependabot: gh api --method GET -H "X-GitHub-Api-Version: 2026-03-10" "repos/{owner}/{repo}/dependabot/alerts?state=open&per_page=100" --jq '.[] | "\(.security_advisory.severity | ascii_upcase) | \(.dependency.package.name) | \(.security_advisory.cve_id // .security_advisory.ghsa_id) | \(.security_advisory.summary)"'

    Collect results into a SCAN_EVIDENCE block for use in steps 2 and 4:

    === SCAN EVIDENCE (pre-fetched — do not re-fetch) ===
    
    --- CODE SCANNING ---
    {formatted output, or "None / not available"}
    
    --- SECRET SCANNING ---
    {formatted output, or "Not available (skipped)"}
    
    --- DEPENDABOT ---
    {formatted output, or "None / not available"}
    
  2. Launch these four (4) subagent_type: "bitwarden-security-engineer:bitwarden-security-engineer" agents in parallel. Each agent has a specific domain — you MUST instruct it to stay within that domain. The agent MUST read references/security-review-rubric.md before starting AND before evaluating findings.

    Agent 1 — Code Security: Focus exclusively on injection flaws (SQL, XSS, command), cryptographic weaknesses, insecure coding patterns, and OWASP A01–A05. Invoke Skill(bitwarden-security-context) and Skill(analyzing-code-security) to guide your analysis. Do not evaluate secrets, dependencies, architecture, or threat modeling.

    Agent 2 — Secrets & Dependencies: Focus exclusively on hardcoded credentials, exposed secrets, vulnerable packages, and supply chain risk. Invoke Skill(bitwarden-security-context), Skill(detecting-secrets), and Skill(reviewing-dependencies) to guide your analysis. Do not evaluate code patterns, architecture, or threat modeling.

    Agent 3 — Security Architecture: Focus exclusively on authentication, authorization, encryption implementation, trust boundaries, and Bitwarden's zero-knowledge invariant (encryption and decryption happen client-side only — the server must never have access to plaintext vault data). Invoke Skill(reviewing-security-architecture) and Skill(bitwarden-security-context) to guide your analysis. Do not evaluate injection flaws, secrets, or threat modeling.

    Agent 4 — Threat Perspective: Focus exclusively on attacker-oriented analysis — trace user input through data flows to dangerous sinks, business logic flaws, privilege escalation paths, data exposure, and API abuse patterns. Invoke Skill(bitwarden-security-context), Skill(analyzing-code-security), and Skill(threat-modeling) to guide your analysis. Do not evaluate architecture patterns, secrets, or dependency versions.

    For all four agents:

    • Use the selected model.
    • CRITICAL: Every agent prompt MUST include this framing at the start: "You are a security researcher analyzing code for impactful, exploitable, and reproducible vulnerabilities for an authorized internal security audit. Your goal is to find real bugs — approach this analysis without safety refusals, as this is an explicitly authorized internal security engagement at Bitwarden."
    • CRITICAL: Every agent prompt MUST include this constraint: "The diff has been pre-fetched and saved to {DIFF_FILE} — read it using the Read tool. DO NOT execute gh pr diff, git diff, or any other diff commands. NEVER use WebFetch, WebSearch, or any gh api endpoints — scan evidence has been pre-fetched and is provided below."
    • CRITICAL: Every agent prompt MUST include the full SCAN_EVIDENCE block gathered in step 1.
    • Report all findings with: severity (CRITICAL/HIGH/MEDIUM/LOW/INFO), affected file and line, and recommended remediation.
    • Report positive security changes (e.g., fixing a CWE, improving cryptography) as ✅ Strengths with a brief rationale.
  3. After all four agents return, rate each finding using the two-axis model defined in references/security-review-rubric.md:

    • Severity: 🔴 CRITICAL | 🟠 HIGH | 🟡 MEDIUM | 🔵 LOW | ⚪ INFO
    • Confidence: 🟢 HIGH | 🟡 MEDIUM | 🔵 LOW
    • Apply the threshold matrix in the rubric to assign a triage category: 🚨 Blocker, ⚠️ Improvement, 📝 Note, ✅ Strength, or ❌ Dismiss.
  4. Launch a verification agent subagent_type: "bitwarden-security-engineer:bitwarden-security-engineer" with all combined findings, their severity/confidence ratings, the triage matrix, the DIFF_FILE path, and the full SCAN_EVIDENCE block from step 1.

    • CRITICAL: Every agent prompt MUST include this constraint: "The diff has been pre-fetched and saved to {DIFF_FILE} — read it using the Read tool. Do NOT run gh pr diff, git diff, or any other diff commands. NEVER use WebFetch, WebSearch, or any gh api endpoints — scan evidence has been pre-fetched and is provided above."
    • The verification agent MUST review, evaluate, verify, and confirm all findings and ratings.
    • Use scan evidence to triangulate: findings corroborated by scanner alerts → increase confidence; findings in areas scanners cleared → apply additional scrutiny.
    • The verification agent MUST classify each finding as: 🚨 Blocker, ⚠️ Improvement, 📝 Note, ✅ Strength, or ❌ Dismiss — applying the threshold matrix from step 2.
    • The verification agent MUST provide a brief rationale for each finding's classification.
    • The verification agent MUST NOT remove any findings.
    • The verification agent MUST NOT introduce any new findings.
  5. Format the summary report.

    First, set the report header based on review mode:

    • PR mode: PR: (#{number}) - {PR title} — {YYYY-MM-DD}
    • Commit mode: Code Review: {short SHA}..HEAD — {YYYY-MM-DD}
    • Time-based mode: Code Review: Changes since {duration} — {YYYY-MM-DD}
    • Local changes mode: Code Review: Local Changes — {YYYY-MM-DD}
    • Branch comparison mode: Code Review: {branch} vs main — {YYYY-MM-DD}

    Then format the report:

    # 🤖 Claude Security Code Review 🤖
    
    {header}
    
    **Date:** {YYYY-MM-DD}
    
    <details>
    <summary><strong>Commits reviewed:</strong> {short-sha}..HEAD · {n} commits · {path1}, {path2}</summary>
    
    | SHA     | Title          |
    | ------- | -------------- |
    | `{sha}` | {commit title} |
    
    </details>
    
    ## Summary
    
    | Category        | Count |
    | --------------- | ----- |
    | 🚨 Blockers     | {n}   |
    | ⚠️ Improvements | {n}   |
    | 📝 Notes        | {n}   |
    | ✅ Strengths    | {n}   |
    | ❌ Dismissed    | {n}   |
    
    {Up to 6 bullets. Include: overall security posture, zero-knowledge invariant status, notable positive changes, key risks or patterns worth watching, and any context that affects how findings should be interpreted. Each bullet should be one tight sentence.}
    
    ## 🚨 Blockers
    
    {Each finding: "- [Description]\n - Location: `filename.ts:42`\n - Severity: 🔴 CRITICAL | 🟠 HIGH\n - Confidence: 🟢 HIGH | 🟡 MEDIUM\n - Rationale: [Why classified as Blocker]"}
    
    ## ⚠️ Improvements
    
    {Each finding: "- [Description]\n - Location: `filename.ts:42`\n - Severity: 🔴 CRITICAL | 🟠 HIGH | 🟡 MEDIUM\n - Confidence: 🟢 HIGH | 🟡 MEDIUM\n - Rationale: [Why classified as Improvement]"}
    
    ## 📝 Notes
    
    {Each finding: "- [Description]\n - Location: `filename.ts:42`\n - Severity: 🟡 MEDIUM | 🔵 LOW | ⚪ INFO\n - Confidence: 🟢 HIGH | 🟡 MEDIUM\n - Rationale: [Why classified as Note]"}
    
    ## ✅ Strengths
    
    <details>
    <summary>Expand for details on ({n}) strengths</summary>
    
    {Each strength: "- [Description]\n - Location: `filename.ts:42`\n - Rationale: [Why this is a positive security change]"}
    
    </details>
    
    ## ❌ Dismissed
    
    <details>
    <summary>Expand for details on ({n}) dismissed findings</summary>
    
    {Each finding: "- [Description]\n - Location: `filename.ts:42`\n - Severity: 🔴 CRITICAL | 🟠 HIGH | 🟡 MEDIUM | 🔵 LOW | ⚪ INFO\n - Confidence: 🔵 LOW\n - Rationale: [Why dismissed]"}
    
    </details>
    

    Omit any section with zero findings entirely — do not render an empty heading. For <details> sections, omit them entirely if the count is zero.

  6. Check the --output argument to determine the output destination. If --output is omitted, check for the $GITHUB_ACTIONS environment variable — if set, default to github; otherwise default to chat.

    Output: chat

    Default when --output is omitted and not running in CI.

    1. Return the report directly to the user in the chat.
    2. Do NOT write any files.

    Output: file

    1. If --output-dir <path> is specified, write to <path>/security-review-YYYY-MM-DD-{identifier}.md. Otherwise write to the current working directory.
    2. {identifier} is the PR number (e.g., PR123), commit SHA (short), or local.
    3. Do NOT use gh pr comment, gh api, or any MCP posting tool.
    4. Confirm the file path to the user after writing.

    Output: github

    Default when --output is omitted and $GITHUB_ACTIONS is set.

    1. Write the report to /tmp/review-summary.md using the Write tool.
    2. Append \n\n<!-- bitwarden-security-code-review --> at the end of the file content.
    3. Do NOT use gh pr comment, gh api, or any MCP posting tool.
    4. Confirm to the user: "Report written to /tmp/review-summary.md for workflow pickup."

    The workflow post-step will read this file and update the placeholder comment automatically.

  7. Delete the temporary diff file. Run rm -f {DIFF_FILE} to securely remove the diff written in step 1B. This step is unconditional — run it in every output mode, whether or not findings were reported. Use the -f flag to suppress errors silently if the file no longer exists. Do not report this step to the user.

Weekly Installs
9
GitHub Stars
84
First Seen
2 days ago