performing-security-testing

Security Test Scanner

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "performing-security-testing" with this command: npx skills add jeremylongshore/claude-code-plugins-plus-skills/jeremylongshore-claude-code-plugins-plus-skills-performing-security-testing

Security Test Scanner

Overview

Automate security vulnerability detection covering OWASP Top 10 categories including SQL injection, XSS, CSRF, broken authentication, and sensitive data exposure. Combines static analysis (source code scanning with Semgrep, Bandit, ESLint security plugins) with dynamic testing patterns (input fuzzing, header validation, authentication bypass checks).

Prerequisites

  • Static analysis tools installed (Semgrep, ESLint with eslint-plugin-security , Bandit for Python, or SpotBugs for Java)

  • Application running in a test environment (never scan production without explicit authorization)

  • Written authorization to perform security testing on the target system

  • npm audit , pip-audit , or trivy for dependency vulnerability scanning

  • OWASP ZAP or Burp Suite for dynamic application security testing (optional)

Instructions

  • Run dependency vulnerability scanning to identify known CVEs:

  • Execute npm audit --json or pip-audit --format json or trivy fs . .

  • Parse results and flag critical/high severity vulnerabilities.

  • Check if vulnerable dependencies have available patches.

  • Perform static application security testing (SAST) on source code:

  • Run Semgrep with OWASP rulesets: semgrep --config=p/owasp-top-ten .

  • Execute language-specific scanners (Bandit for Python, ESLint security for JS).

  • Scan for hardcoded secrets using gitleaks or trufflehog .

  • Analyze code for injection vulnerabilities:

  • Search for string concatenation in SQL queries (use Grep for patterns like "SELECT.*" + ).

  • Identify unsanitized user input flowing into innerHTML , eval() , or exec() .

  • Check for command injection via child_process.exec() or os.system() with user input.

  • Validate authentication and authorization:

  • Verify password hashing uses bcrypt, scrypt, or Argon2 (not MD5/SHA1).

  • Check JWT token validation includes expiration, issuer, and audience claims.

  • Ensure authorization checks exist on every protected endpoint.

  • Test for common web vulnerabilities:

  • CSRF: Verify anti-CSRF tokens on state-changing endpoints.

  • CORS: Check Access-Control-Allow-Origin is not set to * on authenticated endpoints.

  • Security headers: Validate presence of Content-Security-Policy , X-Frame-Options , Strict-Transport-Security .

  • Generate a prioritized findings report with:

  • CVSS score for each vulnerability.

  • Affected file, line number, and code snippet.

  • Specific remediation steps with code examples.

  • Create regression tests for each finding to prevent reintroduction.

Output

  • Security scan report in Markdown with findings sorted by severity

  • Dependency vulnerability list with CVE IDs and available patches

  • SAST findings with file paths, line numbers, and code context

  • Remediation checklist with specific code fixes for each finding

  • Security regression test file to prevent reintroduction of fixed vulnerabilities

Error Handling

Error Cause Solution

False positive on SQL injection ORM parameterized queries flagged as concatenation Add Semgrep nosemgrep comments on verified safe patterns; tune rules to recognize the ORM

Secret scanner flags test fixtures Test files contain example API keys or tokens Add test directories to .gitleaksignore ; use obviously fake values like test-key-000

Dependency audit returns hundreds of results Transitive dependencies with low-severity issues Filter to direct dependencies first; focus on critical/high only; use npm audit --omit=dev

Scanner cannot reach application Application not running or port mismatch Start the application before dynamic scans; verify the base URL and port configuration

Rate limiting blocks scan Too many requests from the scanner Configure scan throttling; use authenticated sessions with higher rate limits

Examples

Semgrep scan for OWASP Top 10:

semgrep --config=p/owasp-top-ten --json --output=security-results.json .

Checking for hardcoded secrets:

gitleaks detect --source=. --report-format=json --report-path=secrets-report.json

Security regression test (Jest):

describe('Security: XSS Prevention', () => { it('escapes HTML entities in user-generated content', () => { const input = '<script>alert("xss")</script>'; const rendered = renderUserComment(input); expect(rendered).not.toContain('<script>'); expect(rendered).toContain('&lt;script&gt;'); });

it('rejects SQL injection in search parameter', async () => { const response = await request(app) .get('/api/search?q='; DROP TABLE users; --') .expect(200); # HTTP 200 OK expect(response.body.results).toBeDefined(); // Verify users table still exists const users = await db.query('SELECT count(*) FROM users'); expect(users.rows[0].count).toBeGreaterThan(0); }); });

Resources

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

xss-vulnerability-scanner

No summary provided by upstream source.

Repository SourceNeeds Review
Security

session-security-checker

No summary provided by upstream source.

Repository SourceNeeds Review
Security

cookie-security-analyzer

No summary provided by upstream source.

Repository SourceNeeds Review