Back to Skills

security-review

thkt
Updated Yesterday
22 views
3
3
View on GitHub
Developmentwordai

About

This Claude Skill performs automated security reviews using OWASP Top 10 standards to detect common vulnerabilities like XSS, SQL injection, and broken access control. It analyzes code for security patterns and suggests secure implementations during code reviews. Use it when working with authentication, authorization, encryption, or other security-focused development tasks.

Documentation

Security Review - OWASP Top 10 Based Code Analysis

🎯 Core Philosophy

"Security is not a feature, it's a foundation"

Security should be built into the design from the start, not added afterward.

What This Skill Provides

  1. OWASP Top 10-Based Checklist - Industry-standard vulnerability patterns
  2. Practical Detection Patterns - Identify dangerous patterns in code
  3. Secure Implementation Examples - Specific methods to fix vulnerabilities
  4. Defensive Coding - Design assuming attacks will happen

📚 Section-Based Content

This skill is organized into 3 specialized sections for efficient context usage:

🔒 Section 1: OWASP Basic Security

File: references/owasp-basic.md Tokens: ~900 Focus: Access Control (OWASP 1), Cryptographic Failures (OWASP 2), Authentication Failures (OWASP 7)

Triggers: Access Control, Broken Access Control, 認証, authentication, 認可, authorization, 暗号化, encryption, password, パスワード, session, セッション

Coverage:

  • Broken Access Control - Authorization and ownership checks
  • Cryptographic Failures - Password hashing, encryption, HTTPS
  • Authentication Failures - Session management, JWT, refresh tokens

💉 Section 2: OWASP Injection Attacks

File: references/owasp-injection.md Tokens: ~600 Focus: Injection (OWASP 3) - SQL, NoSQL, Command + XSS/CSRF Prevention

Triggers: injection, SQL injection, SQLインジェクション, XSS, Cross-Site Scripting, CSRF, Command Injection, NoSQL injection

Coverage:

  • SQL Injection - Parameterized queries, ORM usage
  • NoSQL Injection - Input sanitization for MongoDB
  • Command Injection - Avoid shell execution with user input
  • XSS Prevention - React escaping, DOMPurify
  • CSRF Prevention - CSRF tokens, SameSite cookies

🛡️ Section 3: OWASP Advanced Security

File: references/owasp-advanced.md Tokens: ~800 Focus: Design (OWASP 4-6), Monitoring (OWASP 8-10), SSRF

Triggers: rate limiting, brute force, ブルートフォース, SSRF, Server-Side Request Forgery, Security Misconfiguration, logging, monitoring, dependencies

Coverage:

  • Insecure Design - Rate limiting, account lockout, fail-safe design
  • Security Misconfiguration - Debug mode, CORS, security headers
  • Vulnerable Components - npm audit, dependency management
  • Software Integrity Failures - Subresource Integrity (SRI)
  • Logging & Monitoring Failures - Security event logging
  • SSRF - URL validation, private IP blocking
  • Security Review Checklist - Comprehensive review checklist

💡 Practical Application

Auto-Trigger Example

User: "Implement user registration API"

Security Review Skill triggers →

"From a security perspective, let's ensure:

1. Password hashing (using bcrypt)
2. Rate limiting (brute force protection)
3. Input validation (SQL injection protection)
4. HTTPS communication
5. CSRF token

I'll provide implementation examples..."

Common Scenarios

  1. Implementing login functionality

    • Suggest password hashing
    • Add rate limiting
    • Secure session management
  2. Creating APIs

    • Verify authentication/authorization checks
    • Add input validation
    • Configure rate limiting
  3. Database operations

    • Verify SQL injection protection
    • Recommend parameterized queries
  4. Implementing forms

    • Add CSRF protection
    • Verify XSS protection

✨ Key Takeaways

  1. Defense in Depth - Don't rely on a single measure
  2. Principle of Least Privilege - Minimal permissions
  3. Fail Securely - Safe even when failing
  4. Security by Default - Secure by default

Remember: "Security is not about being perfect, it's about making it harder for attackers"

Quick Install

/plugin add https://github.com/thkt/claude-config/tree/main/security-review

Copy and paste this command in Claude Code to install this skill

GitHub 仓库

thkt/claude-config
Path: skills/security-review

Related Skills

sglang

Meta

SGLang is a high-performance LLM serving framework that specializes in fast, structured generation for JSON, regex, and agentic workflows using its RadixAttention prefix caching. It delivers significantly faster inference, especially for tasks with repeated prefixes, making it ideal for complex, structured outputs and multi-turn conversations. Choose SGLang over alternatives like vLLM when you need constrained decoding or are building applications with extensive prefix sharing.

View skill

evaluating-llms-harness

Testing

This Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.

View skill

llamaguard

Other

LlamaGuard is Meta's 7-8B parameter model for moderating LLM inputs and outputs across six safety categories like violence and hate speech. It offers 94-95% accuracy and can be deployed using vLLM, Hugging Face, or Amazon SageMaker. Use this skill to easily integrate content filtering and safety guardrails into your AI applications.

View skill

langchain

Meta

LangChain is a framework for building LLM applications using agents, chains, and RAG pipelines. It supports multiple LLM providers, offers 500+ integrations, and includes features like tool calling and memory management. Use it for rapid prototyping and deploying production systems like chatbots, autonomous agents, and question-answering services.

View skill