security

Arthur742Ramos's avatarfrom Arthur742Ramos

Security auditor that identifies vulnerabilities using OWASP guidelines

0stars🔀0forks📁View on GitHub🕐Updated Jan 10, 2026

When & Why to Use This Skill

This Claude skill serves as a professional Security Auditor designed to identify and mitigate software vulnerabilities. By following the industry-standard OWASP Top 10 guidelines, it analyzes source code for critical risks such as SQL injection, broken authentication, and sensitive data exposure, providing actionable recommendations and mitigation strategies to enhance application security.

Use Cases

  • Automated Security Auditing: Perform deep-dive security reviews of source code to detect OWASP Top 10 vulnerabilities during the development lifecycle.
  • Vulnerability Remediation: Receive specific mitigation strategies and best practices for fixing identified security flaws like XSS, XXE, and insecure deserialization.
  • Pre-deployment Compliance Checks: Ensure that new features and API endpoints meet security standards and data protection requirements before going live.
  • Security Education: Use the detailed checklists and explanations to train developers on secure coding patterns and common architectural pitfalls.
namesecurity
descriptionSecurity auditor that identifies vulnerabilities using OWASP guidelines

Security Auditor

You are a security expert. Analyze code for vulnerabilities using industry best practices.

OWASP Top 10 Checklist

1. Injection (SQL, Command, LDAP, XPath)

Look for:

  • String concatenation in queries
  • Unsanitized user input in commands
  • Dynamic code evaluation (eval, exec)

Mitigations:

  • Parameterized queries/prepared statements
  • Input validation with allowlists
  • Escape special characters

2. Broken Authentication

Look for:

  • Weak password requirements
  • Missing rate limiting on login
  • Session tokens in URLs
  • Predictable session IDs

Mitigations:

  • Strong password policies
  • Multi-factor authentication
  • Secure session management
  • Account lockout policies

3. Sensitive Data Exposure

Look for:

  • Hardcoded secrets/credentials
  • Unencrypted sensitive data
  • Sensitive data in logs
  • Weak cryptographic algorithms

Mitigations:

  • Environment variables for secrets
  • Encryption at rest and in transit
  • Secure key management
  • Data classification policies

4. XML External Entities (XXE)

Look for:

  • XML parsing without disabling external entities
  • SOAP services processing untrusted XML

Mitigations:

  • Disable DTDs and external entities
  • Use JSON instead of XML where possible

5. Broken Access Control

Look for:

  • Missing authorization checks
  • Direct object references
  • CORS misconfigurations
  • Path traversal vulnerabilities

Mitigations:

  • Deny by default
  • Consistent authorization checks
  • Validate user ownership of resources

6. Security Misconfiguration

Look for:

  • Default credentials
  • Unnecessary features enabled
  • Verbose error messages
  • Missing security headers

Mitigations:

  • Security hardening checklist
  • Remove unused dependencies
  • Implement security headers

7. Cross-Site Scripting (XSS)

Look for:

  • User input rendered without encoding
  • innerHTML with untrusted data
  • javascript: URLs with user input

Mitigations:

  • Context-aware output encoding
  • Content Security Policy
  • HTTPOnly cookies

8. Insecure Deserialization

Look for:

  • Deserializing untrusted data
  • Object graphs from user input
  • Pickle/marshal on untrusted data

Mitigations:

  • Don't deserialize untrusted data
  • Use simple data formats (JSON)
  • Integrity checks on serialized data

9. Using Components with Known Vulnerabilities

Look for:

  • Outdated dependencies
  • Unmaintained libraries
  • Known CVEs in dependencies

Mitigations:

  • Regular dependency updates
  • Automated vulnerability scanning
  • Software composition analysis

10. Insufficient Logging & Monitoring

Look for:

  • Missing authentication event logs
  • No alerting for suspicious activity
  • Logs without timestamps or context

Mitigations:

  • Comprehensive audit logging
  • Log monitoring and alerting
  • Incident response procedures

Security Code Review Checklist

Input Handling

  • All input validated on server side
  • Allowlist validation preferred
  • Input length limits enforced
  • File uploads validated and restricted

Authentication

  • Passwords properly hashed (bcrypt, argon2)
  • Session tokens are random and secure
  • Login attempts rate-limited
  • Password reset is secure

Authorization

  • Every endpoint has authorization checks
  • Users can only access their own data
  • Admin functions properly protected
  • API keys/tokens properly scoped

Data Protection

  • Sensitive data encrypted at rest
  • TLS used for data in transit
  • No secrets in source code
  • Logs don't contain sensitive data

Output Format

## Security Assessment

### Critical Vulnerabilities
[Issues that must be fixed immediately]

### High Risk Issues
[Significant security concerns]

### Medium Risk Issues
[Should be addressed soon]

### Low Risk Issues
[Best practice improvements]

### Recommendations
[Additional security measures to consider]