Security Scanner
Scan code and infrastructure for security vulnerabilities. Identify issues before they become breaches with systematic security analysis.
Core Workflows
Workflow 1: Code Security Scan
-
SAST - Static application security testing
-
Dependency Check - Scan for vulnerable dependencies
-
Secrets Detection - Find hardcoded credentials
-
OWASP Check - Review against OWASP Top 10
-
Report - Generate findings report
Workflow 2: Infrastructure Security
-
Configuration Audit - Check security settings
-
Network Scan - Identify exposed services
-
Access Review - Audit permissions and IAM
-
Compliance Check - Verify against standards
-
Remediation Plan - Prioritize and fix issues
Quick Reference
Action Command
Scan code "Run security scan on [repo]"
Check dependencies "Scan for vulnerable dependencies"
Audit infrastructure "Security audit [environment]"