senior-security

Complete toolkit for senior security with modern tools and best practices.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "senior-security" with this command: npx skills add davila7/claude-code-templates/davila7-claude-code-templates-senior-security

Senior Security

Complete toolkit for senior security with modern tools and best practices.

Quick Start

Main Capabilities

This skill provides three core capabilities through automated scripts:

Script 1: Threat Modeler

python scripts/threat_modeler.py [options]

Script 2: Security Auditor

python scripts/security_auditor.py [options]

Script 3: Pentest Automator

python scripts/pentest_automator.py [options]

Core Capabilities

  1. Threat Modeler

Automated tool for threat modeler tasks.

Features:

  • Automated scaffolding

  • Best practices built-in

  • Configurable templates

  • Quality checks

Usage:

python scripts/threat_modeler.py <project-path> [options]

  1. Security Auditor

Comprehensive analysis and optimization tool.

Features:

  • Deep analysis

  • Performance metrics

  • Recommendations

  • Automated fixes

Usage:

python scripts/security_auditor.py <target-path> [--verbose]

  1. Pentest Automator

Advanced tooling for specialized tasks.

Features:

  • Expert-level automation

  • Custom configurations

  • Integration ready

  • Production-grade output

Usage:

python scripts/pentest_automator.py [arguments] [options]

Reference Documentation

Security Architecture Patterns

Comprehensive guide available in references/security_architecture_patterns.md :

  • Detailed patterns and practices

  • Code examples

  • Best practices

  • Anti-patterns to avoid

  • Real-world scenarios

Penetration Testing Guide

Complete workflow documentation in references/penetration_testing_guide.md :

  • Step-by-step processes

  • Optimization strategies

  • Tool integrations

  • Performance tuning

  • Troubleshooting guide

Cryptography Implementation

Technical reference guide in references/cryptography_implementation.md :

  • Technology stack details

  • Configuration examples

  • Integration patterns

  • Security considerations

  • Scalability guidelines

Tech Stack

Languages: TypeScript, JavaScript, Python, Go, Swift, Kotlin Frontend: React, Next.js, React Native, Flutter Backend: Node.js, Express, GraphQL, REST APIs Database: PostgreSQL, Prisma, NeonDB, Supabase DevOps: Docker, Kubernetes, Terraform, GitHub Actions, CircleCI Cloud: AWS, GCP, Azure

Development Workflow

  1. Setup and Configuration

Install dependencies

npm install

or

pip install -r requirements.txt

Configure environment

cp .env.example .env

  1. Run Quality Checks

Use the analyzer script

python scripts/security_auditor.py .

Review recommendations

Apply fixes

  1. Implement Best Practices

Follow the patterns and practices documented in:

  • references/security_architecture_patterns.md

  • references/penetration_testing_guide.md

  • references/cryptography_implementation.md

Best Practices Summary

Code Quality

  • Follow established patterns

  • Write comprehensive tests

  • Document decisions

  • Review regularly

Performance

  • Measure before optimizing

  • Use appropriate caching

  • Optimize critical paths

  • Monitor in production

Security

  • Validate all inputs

  • Use parameterized queries

  • Implement proper authentication

  • Keep dependencies updated

Maintainability

  • Write clear code

  • Use consistent naming

  • Add helpful comments

  • Keep it simple

Common Commands

Development

npm run dev npm run build npm run test npm run lint

Analysis

python scripts/security_auditor.py . python scripts/pentest_automator.py --analyze

Deployment

docker build -t app:latest . docker-compose up -d kubectl apply -f k8s/

Troubleshooting

Common Issues

Check the comprehensive troubleshooting section in references/cryptography_implementation.md .

Getting Help

  • Review reference documentation

  • Check script output messages

  • Consult tech stack documentation

  • Review error logs

Resources

  • Pattern Reference: references/security_architecture_patterns.md

  • Workflow Guide: references/penetration_testing_guide.md

  • Technical Guide: references/cryptography_implementation.md

  • Tool Scripts: scripts/ directory

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

security-compliance

No summary provided by upstream source.

Repository SourceNeeds Review
Security

seo-audit

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-review

No summary provided by upstream source.

Repository SourceNeeds Review