security-review
について
このClaudeスキルは、OWASP Top 10基準を使用して自動セキュリティレビューを実行し、XSS、SQLインジェクション、壊れたアクセス制御などの一般的な脆弱性を検出します。コードレビュー時にセキュリティパターンを分析し、安全な実装方法を提案します。認証、認可、暗号化、その他のセキュリティ重視の開発タスクに取り組む際にご利用ください。
クイックインストール
Claude Code
推奨/plugin add https://github.com/thkt/claude-configgit clone https://github.com/thkt/claude-config.git ~/.claude/skills/security-reviewこのコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします
ドキュメント
Security Review - OWASP Top 10 Based Code Analysis
🎯 Core Philosophy
"Security is not a feature, it's a foundation"
Security should be built into the design from the start, not added afterward.
What This Skill Provides
- OWASP Top 10-Based Checklist - Industry-standard vulnerability patterns
- Practical Detection Patterns - Identify dangerous patterns in code
- Secure Implementation Examples - Specific methods to fix vulnerabilities
- Defensive Coding - Design assuming attacks will happen
📚 Section-Based Content
This skill is organized into 3 specialized sections for efficient context usage:
🔒 Section 1: OWASP Basic Security
File: references/owasp-basic.md
Tokens: ~900
Focus: Access Control (OWASP 1), Cryptographic Failures (OWASP 2), Authentication Failures (OWASP 7)
Triggers: Access Control, Broken Access Control, 認証, authentication, 認可, authorization, 暗号化, encryption, password, パスワード, session, セッション
Coverage:
- Broken Access Control - Authorization and ownership checks
- Cryptographic Failures - Password hashing, encryption, HTTPS
- Authentication Failures - Session management, JWT, refresh tokens
💉 Section 2: OWASP Injection Attacks
File: references/owasp-injection.md
Tokens: ~600
Focus: Injection (OWASP 3) - SQL, NoSQL, Command + XSS/CSRF Prevention
Triggers: injection, SQL injection, SQLインジェクション, XSS, Cross-Site Scripting, CSRF, Command Injection, NoSQL injection
Coverage:
- SQL Injection - Parameterized queries, ORM usage
- NoSQL Injection - Input sanitization for MongoDB
- Command Injection - Avoid shell execution with user input
- XSS Prevention - React escaping, DOMPurify
- CSRF Prevention - CSRF tokens, SameSite cookies
🛡️ Section 3: OWASP Advanced Security
File: references/owasp-advanced.md
Tokens: ~800
Focus: Design (OWASP 4-6), Monitoring (OWASP 8-10), SSRF
Triggers: rate limiting, brute force, ブルートフォース, SSRF, Server-Side Request Forgery, Security Misconfiguration, logging, monitoring, dependencies
Coverage:
- Insecure Design - Rate limiting, account lockout, fail-safe design
- Security Misconfiguration - Debug mode, CORS, security headers
- Vulnerable Components - npm audit, dependency management
- Software Integrity Failures - Subresource Integrity (SRI)
- Logging & Monitoring Failures - Security event logging
- SSRF - URL validation, private IP blocking
- Security Review Checklist - Comprehensive review checklist
💡 Practical Application
Auto-Trigger Example
User: "Implement user registration API"
Security Review Skill triggers →
"From a security perspective, let's ensure:
1. Password hashing (using bcrypt)
2. Rate limiting (brute force protection)
3. Input validation (SQL injection protection)
4. HTTPS communication
5. CSRF token
I'll provide implementation examples..."
Common Scenarios
-
Implementing login functionality
- Suggest password hashing
- Add rate limiting
- Secure session management
-
Creating APIs
- Verify authentication/authorization checks
- Add input validation
- Configure rate limiting
-
Database operations
- Verify SQL injection protection
- Recommend parameterized queries
-
Implementing forms
- Add CSRF protection
- Verify XSS protection
✨ Key Takeaways
- Defense in Depth - Don't rely on a single measure
- Principle of Least Privilege - Minimal permissions
- Fail Securely - Safe even when failing
- Security by Default - Secure by default
Remember: "Security is not about being perfect, it's about making it harder for attackers"
GitHub リポジトリ
関連スキル
content-collections
メタThis skill provides a production-tested setup for Content Collections, a TypeScript-first tool that transforms Markdown/MDX files into type-safe data collections with Zod validation. Use it when building blogs, documentation sites, or content-heavy Vite + React applications to ensure type safety and automatic content validation. It covers everything from Vite plugin configuration and MDX compilation to deployment optimization and schema validation.
evaluating-llms-harness
テストThis Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.
sglang
メタSGLang is a high-performance LLM serving framework that specializes in fast, structured generation for JSON, regex, and agentic workflows using its RadixAttention prefix caching. It delivers significantly faster inference, especially for tasks with repeated prefixes, making it ideal for complex, structured outputs and multi-turn conversations. Choose SGLang over alternatives like vLLM when you need constrained decoding or are building applications with extensive prefix sharing.
cloudflare-turnstile
メタThis skill provides comprehensive guidance for implementing Cloudflare Turnstile as a CAPTCHA-alternative bot protection system. It covers integration for forms, login pages, API endpoints, and frameworks like React/Next.js/Hono, while handling invisible challenges that maintain user experience. Use it when migrating from reCAPTCHA, debugging error codes, or implementing token validation and E2E tests.
