security-secure-coding
Security Secure Coding
Overview
Use this skill to prevent introducing exploitable code patterns and to enforce explicit security invariants during implementation.
Scope Boundaries
- New endpoints, parsers, deserializers, or command execution paths are added.
- Sensitive data handling or trust-boundary crossing logic changes.
- High-risk dependency or framework behavior needs secure usage decisions.
Templates And Assets
- Secure coding review checklist:
assets/secure-coding-review-checklist.md
Inputs To Gather
- Trust boundaries and untrusted input entry points.
- Sensitive data flows and storage/transmission requirements.
- Language/framework-specific risk patterns.
- Existing test coverage and security tooling signals.
Deliverables
- Security invariants for the changed code path.
- Mitigation mapping for relevant threat classes.
- Targeted secure coding checks and tests.
- Residual risk notes for deferred hardening work.
Workflow
- Identify attack surfaces for the change (input parsing, file/network access, auth context, templating).
- Run checklist from
assets/secure-coding-review-checklist.md. - Apply allowlist validation and context-appropriate encoding/sanitization at boundaries.
- Remove or harden dangerous patterns (shell concatenation, unsafe deserialization, path traversal gaps, SSRF primitives).
- Enforce explicit authorization checks in server-side handlers for sensitive operations.
- Protect secrets and PII in logs, errors, and telemetry outputs.
- Add or update negative tests for malicious payload classes.
- Verify dependencies and transitive packages for known critical vulnerabilities.
Quality Standard
- Security-relevant assumptions are explicit in code and tests.
- Error paths fail closed for sensitive operations.
- No sensitive data leaks through logs or debug output.
- High-risk operations are wrapped with deliberate validation and policy checks.
Failure Conditions
- Stop when trust-boundary validation is missing or implicit.
- Stop when privileged operations execute without explicit authorization checks.
- Escalate when unresolved critical vulnerabilities remain in production-bound paths.
More from kentoshimizu/sw-agent-skills
graph-algorithms
Graph algorithm workflow for modeling entities/relations and selecting traversal, path, ordering, or flow strategies. Use when correctness or performance depends on graph representation and algorithm choice; do not use for schema-only modeling or deployment topology planning.
14bash-style-guide
Style, review, and refactoring standards for Bash shell scripting. Trigger when `.sh` files, files with `#!/usr/bin/env bash` or `#!/bin/bash`, or CI workflow blocks with `shell: bash` are created, modified, or reviewed and Bash-specific quality controls (quoting safety, error handling, portability, readability) must be enforced. Do not use for generic POSIX `sh`, PowerShell, or language-specific application style rules. In multi-language pull requests, run together with other applicable `*-style-guide` skills.
11architecture-clean-architecture
Clean Architecture workflow for enforcing dependency direction, stable domain boundaries, and use-case-centered application design. Use when teams must separate business rules from frameworks and delivery mechanisms; do not use for isolated module cleanup without boundary implications.
11powershell-style-guide
Style, review, and refactoring standards for PowerShell scripting. Trigger when `.ps1`, `.psm1`, `.psd1` files, or CI workflow blocks with `shell: pwsh` or `shell: powershell` are created, modified, or reviewed and PowerShell-specific quality controls (error handling, parameter validation, readability, operational safety) must be enforced. Do not use for Bash, generic POSIX `sh`, or language-specific application style rules. In multi-language pull requests, run together with other applicable `*-style-guide` skills.
10github-codeowners-management
Govern CODEOWNERS rules so review routing reflects real ownership and risk boundaries on GitHub. Use when repository ownership mapping or mandatory reviewer rules must be defined, updated, or audited; do not use for non-GitHub runtime architecture or data-layer design.
9security-authentication
Security workflow for authentication architecture, credential lifecycle, and session/token assurance. Use when login, identity proofing, MFA, or session security decisions are required; do not use for authorization policy design or non-security quality tuning.
9