py-security
SKILL.md
Python Security Analysis and Remediation
Find and fix security vulnerabilities in Python code following Engineering Charter security principles.
Objectives
- Detect security vulnerabilities using automated scanners
- Identify SQL injection risks
- Find hardcoded secrets and credentials
- Detect weak cryptographic practices
- Fix vulnerabilities following secure coding patterns
- Prevent secrets from being committed to git
Required Tools
Add to [dependency-groups] dev: "bandit", "ruff"
- bandit: AST-based security scanner
- ruff --select S: Built-in Bandit rules (faster alternative)
Permissions: Run py-quality-setup first to configure .claude/settings.local.json with all needed tool permissions.
Discovery Phase
Run Security Scanners
# Using bandit (comprehensive reports)
bandit -r . -f json -o bandit_report.json
bandit -r . -ll # Show only medium/high severity
# Using ruff (faster, integrates with existing tooling)
ruff check . --select S
ruff check . --select S --output-format=json > security_report.json
Common Vulnerability Categories
High severity (fix immediately):
- S608: SQL injection via string formatting
- S105, S106, S107: Hardcoded passwords, secrets, keys
- S501, S506: Weak SSL/TLS configuration
- S324: Insecure hash functions (MD5, SHA1)
- S602, S603, S604, S605, S606, S607: Shell injection risks
Medium severity:
- S311: Insecure random number generation
- S301, S302, S303: Insecure deserialization (pickle)
- S701, S702: Jinja2 autoescape issues
Low severity (consider context):
- S101: Use of assert (disabled in production)
- S104: Binding to all interfaces (0.0.0.0)
Remediation Patterns
SQL Injection Prevention
# BEFORE - Vulnerable to SQL injection
def get_user(user_id: str) -> dict:
cursor.execute(f"SELECT * FROM users WHERE id = {user_id}")
return cursor.fetchone()
# AFTER - Use parametrized queries
def get_user(user_id: str) -> dict:
cursor.execute("SELECT * FROM users WHERE id = %s", (user_id,))
return cursor.fetchone()
# For dynamic table/column names (cannot be parametrized)
from psycopg2 import sql
def get_data(table_name: str, column: str) -> list:
# Validate inputs first!
allowed_tables = {"users", "orders", "products"}
if table_name not in allowed_tables:
raise ValueError(f"Invalid table: {table_name}")
query = sql.SQL("SELECT {column} FROM {table}").format(
column=sql.Identifier(column),
table=sql.Identifier(table_name)
)
cursor.execute(query)
return cursor.fetchall()
Hardcoded Secrets Removal
# BEFORE - Hardcoded secrets (NEVER commit these)
API_KEY = "sk-1234567890abcdef"
DATABASE_URL = "postgres://user:password@localhost/db"
SECRET_TOKEN = "my-secret-token-123"
# AFTER - Use environment variables
import os
API_KEY = os.environ["API_KEY"] # Raises if not set
DATABASE_URL = os.getenv("DATABASE_URL", "postgres://localhost/db") # With default
SECRET_TOKEN = os.environ.get("SECRET_TOKEN") # Returns None if not set
# For development, use python-dotenv
from dotenv import load_dotenv
load_dotenv() # Loads from .env file (add .env to .gitignore!)
API_KEY = os.environ["API_KEY"]
Secure Random Number Generation
# BEFORE - Insecure for security-sensitive operations
import random
session_token = random.randint(100000, 999999)
api_key = ''.join(random.choices('abcdef0123456789', k=32))
# AFTER - Use secrets module for cryptographic randomness
import secrets
session_token = secrets.randbelow(900000) + 100000
api_key = secrets.token_hex(16) # 32 hex characters
secure_password = secrets.token_urlsafe(32) # URL-safe token
Secure Cryptography
# BEFORE - Weak hash functions
import hashlib
password_hash = hashlib.md5(password.encode()).hexdigest() # Weak!
checksum = hashlib.sha1(data).hexdigest() # Weak for security!
# AFTER - Use strong hash functions
import hashlib
# For passwords - use bcrypt or argon2
from argon2 import PasswordHasher
ph = PasswordHasher()
password_hash = ph.hash(password)
ph.verify(password_hash, password) # Verify
# For data integrity - use SHA256 or better
checksum = hashlib.sha256(data).hexdigest()
secure_hash = hashlib.blake2b(data).hexdigest()
Shell Command Injection Prevention
# BEFORE - Shell injection vulnerability
import os
import subprocess
filename = user_input
os.system(f"cat {filename}") # Dangerous!
subprocess.call(f"ls {directory}", shell=True) # Dangerous!
# AFTER - Use subprocess with list arguments (no shell)
import subprocess
from pathlib import Path
# Validate input first
filename = user_input
if not Path(filename).exists():
raise ValueError("File not found")
# Use list form, no shell=True
subprocess.run(["cat", filename], check=True)
subprocess.run(["ls", directory], check=True)
# Even better - use Python libraries instead of shell commands
with open(filename) as f:
content = f.read()
Git Hooks Integration
Add secret detection to git hooks (complement to py-git-hooks):
# In .git/hooks/pre-commit, add before other checks:
# Detect potential secrets
if git diff --cached | grep -qiE '(password|secret|api[_-]?key|token|credentials)'; then
echo "⚠️ Warning: Potential secrets detected in staged changes"
echo "Review carefully before committing"
read -p "Continue? (y/n) " -n 1 -r
echo
if [[ ! $REPLY =~ ^[Yy]$ ]]; then
exit 1
fi
fi
Verification Checklist
-
ruff check . --select Sreports no security issues -
bandit -r . -llreports no medium/high severity issues - No hardcoded secrets in codebase (grep for password, secret, api_key, token)
- Secrets loaded from environment variables or .env file
- .env file is in .gitignore
- All SQL queries use parametrized queries
- All tests pass after security fixes
Examples
Example: Security audit workflow
1. Scan: ruff check . --select S; bandit -r . -ll
2. Found: SQL injection (S608), hardcoded secret (S105)
3. Fix SQL: Use parametrized query with %s placeholders
4. Fix secret: Move to .env, use os.environ["API_KEY"]
5. Verify: Scans clean, tests pass
Related Skills
- Prerequisites: py-quality-setup (configure ruff for security checks)
- Enforcement: py-git-hooks (add security scanning to pre-commit)
- See also: py-code-health (cleanup after security fixes)
Weekly Installs
4
Repository
l-mb/python-ref…g-skillsGitHub Stars
9
First Seen
Feb 25, 2026
Security Audits
Installed on
opencode4
github-copilot4
codex4
kimi-cli4
windsurf4
gemini-cli4