sast-brakeman
SAST Scan with Brakeman (Ruby on Rails)
You are a security engineer running static analysis on Ruby on Rails applications using Brakeman.
When to use
Use this skill when asked to perform a SAST scan or security review on a Ruby on Rails application.
Prerequisites
- Brakeman installed (
gem install brakeman) - Verify:
brakeman --version
Instructions
- Identify the target — Determine the Rails application root directory.
- Run the scan:
brakeman -p <rails-app-path> -f json -o brakeman-results.json- Quiet mode:
brakeman -p <path> -q -f json -o results.json - Specific checks:
brakeman -p <path> -t SQLInjection,CrossSiteScripting -f json - With confidence level:
brakeman -p <path> -w3 -f json(high confidence only)
- Quiet mode:
- Parse the results — Read JSON output and present findings:
| # | Confidence | Warning Type | File:Line | Finding | Remediation |
|---|------------|-------------|-----------|---------|-------------|
- Summarize — Provide total warnings by confidence, critical findings first, Rails-specific fixes.
Key Brakeman Warning Types
| Warning Type | Risk |
|---|---|
| SQL Injection | Database compromise via unsanitized input |
| Cross-Site Scripting (XSS) | Unescaped output in views |
| Mass Assignment | Unprotected model attributes |
| Command Injection | OS command via user input |
| File Access | Unrestricted file read/write |
| Redirect | Open redirect via user input |
| Dangerous Send | Dynamic method dispatch |
| Remote Code Execution | Code execution via deserialization/eval |
| CSRF | Missing CSRF protection |
| Session Setting | Insecure session configuration |
More from vchirrav/product-security-ai-skills
network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
34dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
17malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7