Perform a focused security audit on specific components.
Process
Identify context:
-
Target specific files, modules, or API endpoints mentioned by the user
Analyze for security vulnerabilities:
-
Check for OWASP Top 10 vulnerabilities
-
Check for injection flaws (SQLi, Command Injection, XSS)
-
Verify authentication and authorization logic
-
Identify sensitive data exposure risks
-
Check for insecure dependencies (use WebSearch/WebFetch for known CVEs)
Synthesize findings into a Security Report
Output
-
Executive Summary (Risk Level)
-
Vulnerability Analysis
-
Critical: Exploitable flaws (Stop the line)
-
High: Likely exploitable or severe impact
-
Medium: Theoretical or difficult to exploit
-
Low: Best practice hardening
-
Remediation Steps (Code snippets or config changes)
-
Verification (How to test the fix)