security-review

Security Review Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "security-review" with this command: npx skills add nicholasgriffintn/machine-setup/nicholasgriffintn-machine-setup-security-review

Security Review Skill

Tooling Notes

This skill should only use read-only commands and avoid modifying files.

Workflow

Copy this checklist and use it to track your progress through a security review:

Security Review Checklist

  • Scope the Change
    • Identify entry points, data flows, and trust boundaries.
    • Note any changes to auth, secrets, or external integrations.
  • Threat Model
    • Enumerate likely threats (STRIDE or similar).
    • Focus on inputs, storage, and outputs.
  • Validate Input & Output
    • Validate and sanitize user-controlled input.
    • Encode outputs to prevent injection.
    • Constrain file paths and URLs (avoid traversal/SSRF).
  • AuthN/AuthZ
    • Authentication checks are present and consistent.
    • Authorization rules are explicit and least-privilege.
    • Session/token handling uses secure defaults.
  • Secrets & PII
    • No hardcoded secrets or credentials.
    • Logs avoid sensitive data.
    • Storage and transport are protected.
  • Dependency Risk
    • New dependencies are minimal and justified.
    • Lockfiles updated and reviewed.
  • Verification
    • Add or update tests for security-sensitive behavior.
    • Confirm error handling does not leak data.

Security Guardrails

Review Focus Areas

  • Authentication and authorization checks are explicit and consistent.

  • Input validation is present on all user-controlled data.

  • Secrets and credentials never appear in logs or configs.

  • Public endpoints enforce rate limits and safe defaults.

  • Dependencies are minimized and vetted for risk.

Common Red Flags

  • New endpoints without authN/authZ checks.

  • Raw SQL, command execution, or templating with unsanitized input.

  • Hardcoded secrets, tokens, or private keys.

  • Broad permissions or wildcard roles.

Remediation Notes

When issues are found, propose the smallest safe change that addresses the risk, then add or update tests to prevent regressions.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

performance-optimisation

No summary provided by upstream source.

Repository SourceNeeds Review
Research

project-analysis

No summary provided by upstream source.

Repository SourceNeeds Review
General

vercel-react-best-practices

No summary provided by upstream source.

Repository SourceNeeds Review