security-scanning
SKILL.md
Security Scanning
Run static analysis, dependency audits, secret detection, and container scanning.
Static Analysis (SAST)
Semgrep — find code-level vulnerabilities
# Scan current directory with auto-detected rules
semgrep scan --config auto .
# Scan with OWASP top 10 rules
semgrep scan --config "p/owasp-top-ten" .
# Scan specific language
semgrep scan --config "p/python" src/
# Output as JSON for processing
semgrep scan --config auto --json . | jq '.results[] | {path: .path, line: .start.line, rule: .check_id, message: .extra.message}'
# Scan with severity filter
semgrep scan --config auto --severity ERROR .
Dependency Vulnerability Scanning (SCA)
Trivy — scan project dependencies
# Scan filesystem for vulnerable dependencies
trivy fs --severity HIGH,CRITICAL .
# Scan with JSON output
trivy fs --format json --output trivy-report.json .
# Scan specific lockfile
trivy fs --scanners vuln package-lock.json
# Scan and fail on critical (useful for CI)
trivy fs --exit-code 1 --severity CRITICAL .
Snyk — dependency and code scanning
# Test dependencies for known vulnerabilities
snyk test
# Monitor project (registers with Snyk dashboard)
snyk monitor
# Test a specific manifest
snyk test --file=requirements.txt
# Code analysis
snyk code test
# Show dependency tree
snyk test --print-deps
npm/pnpm audit (no extra tools needed)
# npm
npm audit --json | jq '.vulnerabilities | to_entries[] | {name: .key, severity: .value.severity, via: .value.via[0]}'
# pnpm
pnpm audit --json
# pip (Python)
pip audit --format json
Secret Detection
TruffleHog — find leaked credentials
# Scan git history for secrets
trufflehog git file://. --json | jq '{detector: .DetectorName, file: .SourceMetadata.Data.Git.file, line: .SourceMetadata.Data.Git.line}'
# Scan filesystem only (no git history)
trufflehog filesystem . --json
# Scan specific branch
trufflehog git file://. --branch main
# Scan since specific commit
trufflehog git file://. --since-commit abc123
Container Image Scanning
Trivy — scan Docker images
# Scan a local image
trivy image --severity HIGH,CRITICAL myapp:latest
# Scan with full report
trivy image --format json --output image-report.json myapp:latest
# Scan remote image
trivy image --severity CRITICAL nginx:latest
Grype — image vulnerability scanner
# Scan local image
grype myapp:latest
# Scan with severity filter
grype myapp:latest --only-fixed --fail-on critical
# Scan from Dockerfile build context
grype dir:.
# JSON output
grype myapp:latest -o json | jq '.matches[] | {name: .vulnerability.id, severity: .vulnerability.severity, package: .artifact.name}'
Quick Triage Workflow
- Secrets first —
trufflehog git file://. --json(most urgent, leaked creds = immediate risk) - Dependencies —
trivy fs --severity HIGH,CRITICAL .(known CVEs in your supply chain) - Code —
semgrep scan --config auto .(your own code vulnerabilities) - Images —
trivy image myapp:latest(if containerized)
Notes
- Always review findings before acting — false positives are common in SAST.
- Severity levels: CRITICAL > HIGH > MEDIUM > LOW > INFO. Focus on CRITICAL and HIGH first.
- For CI pipelines, use
--exit-code 1(Trivy) or--error(Semgrep) to fail builds on findings. - Secret detection in git history can be slow on large repos. Use
--since-committo limit scope. - Run
snyk authbefore first use of Snyk CLI.
Weekly Installs
2
Repository
thinkfleetai/th…t-engineFirst Seen
14 days ago
Security Audits
Installed on
opencode2
gemini-cli2
claude-code2
github-copilot2
codex2
kimi-cli2