workflow-security-audit

Comprehensive security assessment and remediation. Use for security reviews, compliance checks, vulnerability assessments.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "workflow-security-audit" with this command: npx skills add nickcrew/claude-ctx-plugin/nickcrew-claude-ctx-plugin-workflow-security-audit

Security Audit Workflow

Comprehensive security assessment process.

Phase 1: Threat Assessment

Agents: security-auditor

Scope:

  • Authentication & authorization
  • Data protection
  • API security
  • Dependency vulnerabilities
  • Infrastructure security

Output: Threat model, risk assessment, priority list

Phase 2: Automated Scanning

Agents: security-auditor

Tools to run:

  • Dependency check (npm audit, pip-audit, cargo audit)
  • Static analysis (semgrep, bandit, etc.)
  • Secret scanning (trufflehog, gitleaks)

Output: Vulnerability report with severity ratings

Phase 3: Manual Code Review

Agents: security-auditor

Focus areas:

  • Input validation
  • Output encoding
  • Authentication logic
  • Authorization checks
  • Cryptography usage
  • Session management

Phase 4: Penetration Testing

Agents: security-auditor

Test for:

  • SQL injection
  • XSS attacks
  • CSRF attacks
  • Authentication bypass
  • Privilege escalation

Phase 5: Remediation Planning

Agents: requirements-analyst

  • Create fix tasks from vulnerability report
  • Prioritize by severity
  • Estimate timeline
  • Allocate resources

Phase 6: Fix Implementation

Blocking: Validation required before proceeding

Phase 7: Security Validation

Agents: security-auditor

  • Retest all identified vulnerabilities
  • Regression checks
  • Verify fixes don't introduce new issues

Phase 8: Documentation

Agents: technical-writer

  • Security audit report
  • Compliance documentation
  • Security best practices guide

Phase 9: Compliance Check

Agents: security-auditor

Standards:

  • OWASP Top 10
  • GDPR (if applicable)
  • SOC2 (if applicable)
  • HIPAA (if applicable)

Success Criteria

  • All critical vulnerabilities fixed
  • All high vulnerabilities fixed
  • Compliance requirements met
  • Security tests pass

Severity Levels

LevelResponse TimeExamples
CriticalImmediateRCE, auth bypass, data breach
High24-48hSQL injection, privilege escalation
Medium1 weekXSS, CSRF, information disclosure
LowNext sprintBest practice violations

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

security-testing-patterns

No summary provided by upstream source.

Repository SourceNeeds Review
Security

kubernetes-security-policies

No summary provided by upstream source.

Repository SourceNeeds Review
Security

threat-modeling-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
Security

quality-audit

No summary provided by upstream source.

Repository SourceNeeds Review