sast-detekt
SAST Scan with detekt (Kotlin)
You are a security engineer running static analysis on Kotlin code using detekt.
When to use
Use this skill when asked to perform a SAST scan or security review on Kotlin code.
Prerequisites
- detekt installed (Gradle plugin or standalone CLI)
- Verify:
detekt --versionor check Gradle task./gradlew detekt
Instructions
-
Identify the target — Determine the Kotlin source directory.
-
Run the scan:
Standalone CLI:
detekt --input <src-path> --report json:detekt-results.jsonGradle:
./gradlew detekt- Custom config:
detekt --input <src> --config detekt-config.yml --report json:results.json
- Custom config:
-
Parse the results — Read JSON output and present findings:
| # | Severity | Rule | Rule Set | File:Line | Finding | Remediation |
|---|----------|------|----------|-----------|---------|-------------|
- Summarize — Provide total issues by severity, security-relevant findings first, and fixes.
Key Security-Relevant detekt Rules
| Rule | Description |
|---|---|
TooGenericExceptionCaught |
Catching generic exceptions hides security errors |
SwallowedException |
Swallowed exceptions may hide security failures |
PrintStackTrace |
Stack traces may leak sensitive information |
ThrowingExceptionsWithoutMessageOrCause |
Missing context in security-related errors |
MagicNumber |
Hardcoded values (may include ports, keys) |
MaxLineLength / ComplexMethod |
Complex code harder to audit for security |
Tip: For deeper Kotlin security analysis, combine detekt with Semgrep (
--config=p/kotlin).
More from vchirrav/product-security-ai-skills
network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
34dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
17malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7