security-setup
Security Setup
Install a local-first security hardening stack for a project. Favor checks that run offline at hook time, produce machine-readable output, and give developers a clear summary before code leaves their machine.
Repo Sync Before Edits (mandatory)
Before creating/updating/deleting files in an existing repository, sync the current branch with remote:
branch="$(git rev-parse --abbrev-ref HEAD)"
git fetch origin
git pull --rebase origin "$branch"
If the working tree is not clean, stash first as a backup, sync, then restore:
git stash push -u -m "pre-sync" # backup local changes
branch="$(git rev-parse --abbrev-ref HEAD)"
git fetch origin && git pull --rebase origin "$branch"
git stash pop # rollback by restoring the backup
If origin is missing, pull is unavailable, or rebase/stash conflicts occur, stop
and ask the user before continuing. Never use --force rollback options without
confirmation.
Operating Model
Work in two gated phases:
- Local security baseline - install a pre-commit hook that checks secrets, dependency vulnerabilities, and static analysis issues locally.
- CI/CD mirror - only when the user asks for
--ci, create a free-tier GitHub Actions workflow that runs the same local runner on pull requests.
Do not create CI files until Phase 1 is installed and passing.
Phase 1 - Local Security Baseline
1. Detect the Project
Inspect the repo before choosing tools. The runner and skill instructions work on macOS, Linux, and Windows; pick the matching shell snippet.
macOS / Linux (bash, zsh):
ls -la package.json package-lock.json pnpm-lock.yaml yarn.lock pyproject.toml requirements.txt Cargo.toml Cargo.lock go.mod pom.xml build.gradle 2>/dev/null
ls -la .pre-commit-config.yaml SECURITY.md .github/workflows/security.yml 2>/dev/null
command -v gitleaks trivy semgrep detect-secrets bandit cargo-audit pre-commit 2>/dev/null
Windows PowerShell:
Get-ChildItem -Force -ErrorAction SilentlyContinue package.json,package-lock.json,pnpm-lock.yaml,yarn.lock,pyproject.toml,requirements.txt,Cargo.toml,Cargo.lock,go.mod,pom.xml,build.gradle
Get-ChildItem -Force -ErrorAction SilentlyContinue .pre-commit-config.yaml,SECURITY.md,.github\workflows\security.yml
foreach ($t in 'gitleaks','trivy','semgrep','detect-secrets','bandit','cargo-audit','pre-commit') { Get-Command $t -ErrorAction SilentlyContinue }
Identify:
- Languages and lockfiles
- Existing pre-commit config and security docs
- Available local tools
- Whether the repo is public or private, if CI/SARIF upload is requested
Use references/tool-selection.md for the tool matrix and install commands.
2. Select the Minimal Tool Set
Choose the smallest useful set:
- Secrets: prefer
gitleaks; usedetect-secretswhen it already exists in a Python-heavy repo. - Dependencies: prefer
trivy fs --skip-db-updatefor offline hook runtime; addcargo-auditonly for Rust repos that already use Cargo. - Static analysis: prefer
semgrepwith local rules undersecurity/. Add language-native scanners only when the language is present (banditfor Python,gosecfor Go,cargo clippy/cargo auditfor Rust).
The hook must not call cloud services at runtime. If a scanner needs a local
database, warm that database during setup and run with offline flags in the hook.
If offline dependency scanning cannot be configured for an ecosystem, document the
gap in SECURITY.md and do not pretend the criterion is satisfied.
File-aware scoping (per-check triggers)
Pre-commit must be fast on small commits without losing coverage. Each check declares its own relevance rule — never a global "skip on .md only" filter.
Trigger semantics in security/security-tools.json:
| Trigger | Behavior |
|---|---|
"always": true |
Always run. Use for secret scanners — secrets land in .md, .json, .env.example, Dockerfile, anywhere. |
"paths": [globs] |
Run only when at least one staged file matches a glob. Use for lockfile-driven (trivy, cargo-audit) or language-driven (semgrep, bandit) checks. |
| (omitted) | Runner falls back to the per-tool defaults baked into scripts/security_check.py for the recognized tool name. |
A repo-wide trip_all_paths list (default: .pre-commit-config.yaml, security/**,
.github/workflows/**, Dockerfile*, .dockerignore, scripts/security_check.py)
forces every applicable check to run when any of those files is staged. This
catches workflow-injection edits, hook-tampering, and Dockerfile RCE that would
otherwise slip past purely category-based scoping.
CI runs full scans (--all). Scoping only applies on developer commits; the CI
mirror is the safety net.
Mandatory invariant: secret scanning runs on every commit. Do not move gitleaks (or its replacement) into a path-restricted trigger.
3. Generate Local Files
Before writing files, dry-run the changes: list every target path, diff any
existing file against the planned content, and confirm with the user. If a
target file already exists, back it up to <path>.bak so the user can
rollback. Treat any overwrite of .pre-commit-config.yaml or SECURITY.md
as destructive and require explicit confirmation.
Create or update these files:
.pre-commit-config.yaml- merge a localsecurity-checkhook into existing config; do not overwrite user hooks.scripts/security_check.py- copy fromscripts/security_check.pyin this skill, then adjust tool config if needed.security/semgrep-rules.yml- local Semgrep rules so runtime scans are offline.security/security-tools.json- selected tools and command overrides.SECURITY.md- summary of selected tools, why they were chosen, and how to run or bypass checks.
Use references/templates.md for starter snippets.
4. Bypass Policy
Never add a silent bypass. Bypass cannot be performed through git commit
because pre-commit redirects hook stdin to /dev/null, so the runner's
TTY check refuses --force from inside the hook. The approved bypass is a
two-step, explicit override:
-
Run the runner directly with
--forceand typeYESat the prompt:# macOS / Linux SECURITY_CHECK_ARGS=--force python3 scripts/security_check.py# Windows PowerShell $env:SECURITY_CHECK_ARGS = "--force"; python scripts\security_check.py; Remove-Item Env:SECURITY_CHECK_ARGS:: Windows cmd.exe set SECURITY_CHECK_ARGS=--force && python scripts\security_check.py && set SECURITY_CHECK_ARGS=The runner prints the prompt:
Type YES to override security checks and force-push:It accepts only the literal string
YES. Any other input, EOF, or a non-TTY context exits non-zero and refuses the bypass. -
After the override is recorded in the report, commit with
git commit --no-verify. Document the bypass inSECURITY.md(date, reason, link to the recorded report) so the override is auditable.
Do not add --force to the pre-commit hook entry, and do not wrap
git commit in a script that opens /dev/tty for the hook — both routes
hide the bypass from review.
5. Verify Locally
Run the local checks after writing files. Use python3 on macOS/Linux and
python on Windows (the Python launcher routes to the active interpreter).
Verification uses --all so every configured check runs regardless of what
happens to be staged.
# macOS / Linux
python3 scripts/security_check.py --all --no-fail-on-missing-tools
pre-commit run security-check --all-files
# Windows PowerShell
python scripts\security_check.py --all --no-fail-on-missing-tools
pre-commit run security-check --all-files
When run from a pre-commit hook with no flags, the runner inspects
git diff --cached and scopes checks to the staged file set per the trigger
table in §2. --all overrides this for verification or one-off full scans;
--staged-only errors if no staged files are found (useful for guarded
hooks).
If pre-commit is not installed, print the install command and stop:
python3 -m pip install pre-commit # use `python` on Windows
pre-commit install
Expected output
A successful first run prints a summary to stdout and exits 0. Verify the output matches this shape (exact counts vary):
Security Check Summary
======================
Mode: full
Checks run: 3 of 3 (skipped: 0)
Findings: 1
Severity: HIGH=1
Categories: dependencies=1
JSON report: security/security-report.json
Markdown report: security/security-report.md
Top findings:
- HIGH [dependencies/trivy] CVE-XXXX-XXXX in <pkg> (<lockfile>)
Hint: Upgrade to <version>.
A scoped run on a docs-only commit looks like:
Mode: staged
Staged files: 2
Checks run: 1 of 3 (skipped: 2)
Skipped: trivy, semgrep
Skipped checks are recorded in both reports with their scope reason — they are not silent.
Assert: a clean run exits 0, both report paths exist, and
security-report.json parses as valid JSON with a top-level summary
object. Any HIGH or CRITICAL finding exits non-zero unless the bypass
in §"4. Bypass Policy" was completed.
Phase 2 - CI/CD Mirror (--ci)
Only run this phase when the user asks for CI/CD, for example
/security-setup --ci.
Preconditions:
- Phase 1 files exist
python3 scripts/security_check.py --no-fail-on-missing-toolsruns locally.pre-commit-config.yamlcontains thesecurity-checkhook
Then create .github/workflows/security.yml using references/templates.md.
Keep the workflow free-tier friendly:
- Trigger on
pull_requestandpushto the default branch. - Install only the selected tools.
- Cache scanner databases where supported.
- Run
python3 scripts/security_check.py. - Upload SARIF only when the repo can use GitHub Code Scanning; otherwise keep the job summary only.
Report Requirements
The local runner must print a concise report with:
- Total checks run
- Findings by category: secrets, dependencies, static analysis, tool errors
- Severity breakdown: critical, high, medium, low, info
- Actionable fix hints
- Paths to JSON and Markdown report artifacts
The default exit behavior is strict: any HIGH or CRITICAL finding exits
non-zero.
Acceptance Criteria
A completed setup passes when:
-
.pre-commit-config.yamlcontains a localsecurity-checkhook. -
scripts/security_check.pyexists and prints the required summary. - Secret detection, dependency scanning, and static analysis are configured for the detected project where offline local tooling is available.
- Hook runtime uses offline flags and does not require cloud credentials.
-
--forcerequires the exactYESconfirmation before bypassing failures. -
SECURITY.mddocuments selected tools, omissions, run commands, and CI status. -
--cicreates.github/workflows/security.ymlonly after Phase 1 passes.
File-aware scoping (no-blindspot scenarios)
Walk through these manually after install. Each one is a real failure mode naive scoping creates:
- Docs-only with leaked key. Stage a
README.mdcontaining a syntheticAKIA…AWS key. Hook fails HIGH (gitleaks ran). - Docs-only clean. Stage a
README.mdwith no secrets. Exit 0;trivy/semgrep/banditreported as skipped with reason; runtime is measurably faster than--all. - Lockfile change. Stage
package-lock.json.trivyruns. - Source code with anti-pattern. Stage a
.pyfile containingeval(user_input).semgrepandbanditrun; exit non-zero. - Workflow tampering. Stage
.github/workflows/foo.ymlwith${{ github.event.issue.title }}interpolated into arun:step. The trip-all rule fires;semgrepruns. - Full scan.
python3 scripts/security_check.py --allbehaves like pre-1.3.0 (every configured check executes).
Edge Cases
- Existing hooks: merge the new hook; preserve all existing hooks and revs.
- Monorepo: use path filters in
security/security-tools.jsonand document per-package coverage. - Missing tools: install the minimal missing set or tell the user the exact command; do not silently skip required categories.
- Private repo SARIF: GitHub Code Scanning may require a paid plan. Keep the summary report and skip SARIF upload unless available.
- Network-restricted setup: create configs and report the commands that must be run later to warm vulnerability databases.
Step Completion Report
After each phase, report:
◆ Security Setup ([phase] - [context])
................................................................
Project detection: pass | fail - detail
Tool selection: pass | fail - detail
Local hook: pass | fail - detail
Security report: pass | fail - detail
CI mirror: pass | skipped | fail - detail
Criteria: N/M met
____________________________
Result: PASS | PARTIAL | FAIL
Resources
references/tool-selection.md- offline-first tool matrix and install notesreferences/templates.md- target repo file templatesscripts/security_check.py- reusable local security summary runner
More from luongnv89/skills
ollama-optimizer
Optimize Ollama configuration for the current machine's hardware. Use when asked to speed up Ollama, tune local LLM performance, or pick models that fit available GPU/RAM.
126logo-designer
Generate professional SVG logos from project context, producing 7 brand variants (mark, full, wordmark, icon, favicon, white, black) plus a showcase HTML page. Skip for raster-only logos, product illustrations, or full brand-guideline docs.
122code-optimizer
Analyze code for performance bottlenecks, memory leaks, and algorithmic inefficiencies. Use when asked to optimize, find bottlenecks, or improve efficiency. Don't use for bug-hunting code review, security audits, or refactoring without a perf goal.
76code-review
Review code changes for bugs, security vulnerabilities, and code quality issues — producing prioritized findings with specific fix suggestions. Don't use for performance tuning, writing new features from scratch, or generating test cases.
75idea-validator
Evaluate app ideas and startup concepts across market viability, technical feasibility, and competitive landscape. Use when asked to validate, review, or score a product idea. Don't use for writing a PRD, detailed go-to-market plans, or financial/investor pitch decks.
70test-coverage
Generate unit tests for untested branches and edge cases. Use when coverage is low, CI flags gaps, or a release needs hardening. Not for integration/E2E suites, framework migrations, or fixing production bugs.
63