MCP HubMCP Hub
スキル一覧に戻る

security-review

thkt
更新日 Yesterday
60 閲覧
3
3
GitHubで表示
開発wordai

について

このClaudeスキルは、OWASP Top 10基準を使用して自動セキュリティレビューを実行し、XSS、SQLインジェクション、壊れたアクセス制御などの一般的な脆弱性を検出します。コードレビュー時にセキュリティパターンを分析し、安全な実装方法を提案します。認証、認可、暗号化、その他のセキュリティ重視の開発タスクに取り組む際にご利用ください。

クイックインストール

Claude Code

推奨
プラグインコマンド推奨
/plugin add https://github.com/thkt/claude-config
Git クローン代替
git clone https://github.com/thkt/claude-config.git ~/.claude/skills/security-review

このコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします

ドキュメント

Security Review - OWASP Top 10 Based Code Analysis

🎯 Core Philosophy

"Security is not a feature, it's a foundation"

Security should be built into the design from the start, not added afterward.

What This Skill Provides

  1. OWASP Top 10-Based Checklist - Industry-standard vulnerability patterns
  2. Practical Detection Patterns - Identify dangerous patterns in code
  3. Secure Implementation Examples - Specific methods to fix vulnerabilities
  4. Defensive Coding - Design assuming attacks will happen

📚 Section-Based Content

This skill is organized into 3 specialized sections for efficient context usage:

🔒 Section 1: OWASP Basic Security

File: references/owasp-basic.md Tokens: ~900 Focus: Access Control (OWASP 1), Cryptographic Failures (OWASP 2), Authentication Failures (OWASP 7)

Triggers: Access Control, Broken Access Control, 認証, authentication, 認可, authorization, 暗号化, encryption, password, パスワード, session, セッション

Coverage:

  • Broken Access Control - Authorization and ownership checks
  • Cryptographic Failures - Password hashing, encryption, HTTPS
  • Authentication Failures - Session management, JWT, refresh tokens

💉 Section 2: OWASP Injection Attacks

File: references/owasp-injection.md Tokens: ~600 Focus: Injection (OWASP 3) - SQL, NoSQL, Command + XSS/CSRF Prevention

Triggers: injection, SQL injection, SQLインジェクション, XSS, Cross-Site Scripting, CSRF, Command Injection, NoSQL injection

Coverage:

  • SQL Injection - Parameterized queries, ORM usage
  • NoSQL Injection - Input sanitization for MongoDB
  • Command Injection - Avoid shell execution with user input
  • XSS Prevention - React escaping, DOMPurify
  • CSRF Prevention - CSRF tokens, SameSite cookies

🛡️ Section 3: OWASP Advanced Security

File: references/owasp-advanced.md Tokens: ~800 Focus: Design (OWASP 4-6), Monitoring (OWASP 8-10), SSRF

Triggers: rate limiting, brute force, ブルートフォース, SSRF, Server-Side Request Forgery, Security Misconfiguration, logging, monitoring, dependencies

Coverage:

  • Insecure Design - Rate limiting, account lockout, fail-safe design
  • Security Misconfiguration - Debug mode, CORS, security headers
  • Vulnerable Components - npm audit, dependency management
  • Software Integrity Failures - Subresource Integrity (SRI)
  • Logging & Monitoring Failures - Security event logging
  • SSRF - URL validation, private IP blocking
  • Security Review Checklist - Comprehensive review checklist

💡 Practical Application

Auto-Trigger Example

User: "Implement user registration API"

Security Review Skill triggers →

"From a security perspective, let's ensure:

1. Password hashing (using bcrypt)
2. Rate limiting (brute force protection)
3. Input validation (SQL injection protection)
4. HTTPS communication
5. CSRF token

I'll provide implementation examples..."

Common Scenarios

  1. Implementing login functionality

    • Suggest password hashing
    • Add rate limiting
    • Secure session management
  2. Creating APIs

    • Verify authentication/authorization checks
    • Add input validation
    • Configure rate limiting
  3. Database operations

    • Verify SQL injection protection
    • Recommend parameterized queries
  4. Implementing forms

    • Add CSRF protection
    • Verify XSS protection

✨ Key Takeaways

  1. Defense in Depth - Don't rely on a single measure
  2. Principle of Least Privilege - Minimal permissions
  3. Fail Securely - Safe even when failing
  4. Security by Default - Secure by default

Remember: "Security is not about being perfect, it's about making it harder for attackers"

GitHub リポジトリ

thkt/claude-config
パス: skills/security-review

関連スキル

content-collections

メタ

This skill provides a production-tested setup for Content Collections, a TypeScript-first tool that transforms Markdown/MDX files into type-safe data collections with Zod validation. Use it when building blogs, documentation sites, or content-heavy Vite + React applications to ensure type safety and automatic content validation. It covers everything from Vite plugin configuration and MDX compilation to deployment optimization and schema validation.

スキルを見る

evaluating-llms-harness

テスト

This Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.

スキルを見る

sglang

メタ

SGLang is a high-performance LLM serving framework that specializes in fast, structured generation for JSON, regex, and agentic workflows using its RadixAttention prefix caching. It delivers significantly faster inference, especially for tasks with repeated prefixes, making it ideal for complex, structured outputs and multi-turn conversations. Choose SGLang over alternatives like vLLM when you need constrained decoding or are building applications with extensive prefix sharing.

スキルを見る

cloudflare-turnstile

メタ

This skill provides comprehensive guidance for implementing Cloudflare Turnstile as a CAPTCHA-alternative bot protection system. It covers integration for forms, login pages, API endpoints, and frameworks like React/Next.js/Hono, while handling invisible challenges that maintain user experience. Use it when migrating from reCAPTCHA, debugging error codes, or implementing token validation and E2E tests.

スキルを見る