MCP HubMCP Hub
スキル一覧に戻る

checking-owasp-compliance

jeremylongshore
更新日 Today
52 閲覧
712
74
712
GitHubで表示
その他general

について

このスキルは、セキュリティ監査中にコードベースを自動的にスキャンし、OWASP Top 10のセキュリティ脆弱性を検出します。一般的なWebアプリケーションリスクを分析して実用的な洞察を提供し、OWASP ZAPなどのツールと統合して包括的なチェックを行います。開発者はこれを使用して、セキュリティコンプライアンスを検証し、プロジェクト内の潜在的な弱点を特定すべきです。

クイックインストール

Claude Code

推奨
プラグインコマンド推奨
/plugin add https://github.com/jeremylongshore/claude-code-plugins-plus
Git クローン代替
git clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/checking-owasp-compliance

このコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします

ドキュメント

Overview

This skill empowers Claude to assess your project's adherence to the OWASP Top 10 (2021) security guidelines. It automates the process of identifying potential vulnerabilities related to common web application security risks, providing actionable insights to improve your application's security posture.

How It Works

  1. Initiate Scan: The skill activates the owasp-compliance-checker plugin upon request.
  2. Analyze Codebase: The plugin scans the codebase for potential vulnerabilities related to each OWASP Top 10 category.
  3. Generate Report: A detailed report is generated, highlighting compliance gaps and providing specific remediation guidance for each identified issue.

When to Use This Skill

This skill activates when you need to:

  • Evaluate your application's security posture against the OWASP Top 10 (2021).
  • Identify potential vulnerabilities related to common web application security risks.
  • Obtain actionable remediation guidance to address identified vulnerabilities.
  • Generate a compliance report for auditing or reporting purposes.

Examples

Example 1: Identifying SQL Injection Vulnerabilities

User request: "Check OWASP compliance for SQL injection vulnerabilities."

The skill will:

  1. Activate the owasp-compliance-checker plugin.
  2. Scan the codebase for potential SQL injection vulnerabilities.
  3. Generate a report highlighting any identified SQL injection vulnerabilities and providing remediation guidance.

Example 2: Assessing Overall OWASP Compliance

User request: "/owasp"

The skill will:

  1. Activate the owasp-compliance-checker plugin.
  2. Scan the entire codebase for vulnerabilities across all OWASP Top 10 categories.
  3. Generate a comprehensive report detailing compliance gaps and remediation steps for each category.

Best Practices

  • Regular Scanning: Integrate OWASP compliance checks into your development workflow for continuous security monitoring.
  • Prioritize Remediation: Address identified vulnerabilities based on their severity and potential impact.
  • Stay Updated: Keep your OWASP compliance checker plugin updated to benefit from the latest vulnerability detection rules and remediation guidance.

Integration

This skill can be integrated with other plugins to automate vulnerability remediation or generate comprehensive security reports. For example, it can be used in conjunction with a code modification plugin to automatically apply recommended fixes for identified vulnerabilities.

Prerequisites

  • Access to codebase and configuration files in {baseDir}/
  • Security scanning tools installed as needed
  • Understanding of security standards and best practices
  • Permissions for security analysis operations

Instructions

  1. Identify security scan scope and targets
  2. Configure scanning parameters and thresholds
  3. Execute security analysis systematically
  4. Analyze findings for vulnerabilities and compliance gaps
  5. Prioritize issues by severity and impact
  6. Generate detailed security report with remediation steps

Output

  • Security scan results with vulnerability details
  • Compliance status reports by standard
  • Prioritized list of security issues by severity
  • Remediation recommendations with code examples
  • Executive summary for stakeholders

Error Handling

If security scanning fails:

  • Verify tool installation and configuration
  • Check file and directory permissions
  • Validate scan target paths
  • Review tool-specific error messages
  • Ensure network access for dependency checks

Resources

  • Security standard documentation (OWASP, CWE, CVE)
  • Compliance framework guidelines (GDPR, HIPAA, PCI-DSS)
  • Security scanning tool documentation
  • Vulnerability remediation best practices

GitHub リポジトリ

jeremylongshore/claude-code-plugins-plus
パス: plugins/security/owasp-compliance-checker/skills/owasp-compliance-checker
aiautomationclaude-codedevopsmarketplacemcp

関連スキル

algorithmic-art

メタ

This Claude Skill creates original algorithmic art using p5.js with seeded randomness and interactive parameters. It generates .md files for algorithmic philosophies, plus .html and .js files for interactive generative art implementations. Use it when developers need to create flow fields, particle systems, or other computational art while avoiding copyright issues.

スキルを見る

subagent-driven-development

開発

This skill executes implementation plans by dispatching a fresh subagent for each independent task, with code review between tasks. It enables fast iteration while maintaining quality gates through this review process. Use it when working on mostly independent tasks within the same session to ensure continuous progress with built-in quality checks.

スキルを見る

executing-plans

デザイン

Use the executing-plans skill when you have a complete implementation plan to execute in controlled batches with review checkpoints. It loads and critically reviews the plan, then executes tasks in small batches (default 3 tasks) while reporting progress between each batch for architect review. This ensures systematic implementation with built-in quality control checkpoints.

スキルを見る

cost-optimization

その他

This Claude Skill helps developers optimize cloud costs through resource rightsizing, tagging strategies, and spending analysis. It provides a framework for reducing cloud expenses and implementing cost governance across AWS, Azure, and GCP. Use it when you need to analyze infrastructure costs, right-size resources, or meet budget constraints.

スキルを見る