generating-security-audit-reports
について
このスキルは、スキャンデータと設定ファイルを分析してセキュリティ態勢とコンプライアンスを評価し、包括的なセキュリティ監査報告書を生成します。脆弱性を特定し、PCI-DSSなどのフレームワークに照らして評価を行い、正式な文書を作成します。開発者は、既存のセキュリティツールの出力からセキュリティ評価やコンプライアンス報告書を作成する必要がある場合に、このスキルを使用すべきです。
クイックインストール
Claude Code
推奨/plugin add https://github.com/jeremylongshore/claude-code-plugins-plusgit clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/generating-security-audit-reportsこのコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします
ドキュメント
Prerequisites
Before using this skill, ensure:
- Security scan data or logs are available in {baseDir}/security/
- Access to application configuration files
- Security tool outputs (e.g., vulnerability scanners, SAST/DAST results)
- Compliance framework documentation (if applicable)
- Write permissions for generating report files
Instructions
1. Data Collection Phase
Gather security information from available sources:
- Read vulnerability scan results
- Analyze security configurations
- Review access control policies
- Check encryption implementations
- Examine authentication mechanisms
2. Analysis Phase
Process collected data to identify:
- Critical vulnerabilities (CVSS scores, exploitability)
- Security misconfigurations
- Compliance gaps against standards (PCI-DSS, GDPR, HIPAA, SOC 2)
- Access control weaknesses
- Data protection issues
3. Report Generation Phase
Create structured audit report with:
- Executive summary with risk overview
- Detailed vulnerability findings with severity ratings
- Compliance status matrix
- Risk assessment and prioritization
- Remediation recommendations with timelines
- Technical appendices with evidence
4. Output Formatting
Generate report in requested format:
- Markdown for version control
- HTML for stakeholder review
- JSON for integration with ticketing systems
- PDF-ready structure for formal documentation
Output
The skill produces:
Primary Output: Comprehensive security audit report saved to {baseDir}/reports/security-audit-YYYYMMDD.md
Report Structure:
# Security Audit Report - [System Name]
## Executive Summary
- Overall risk rating
- Critical findings count
- Compliance status
## Vulnerability Findings
### Critical (CVSS 9.0+)
- [CVE-XXXX-XXXX] Description
- Impact assessment
- Remediation steps
### High (CVSS 7.0-8.9)
[Similar structure]
## Compliance Assessment
- PCI-DSS: 85% compliant (gaps identified)
- GDPR: 92% compliant
- SOC 2: In progress
## Remediation Plan
Priority matrix with timelines
## Technical Appendices
Evidence and scan outputs
Secondary Outputs:
- Vulnerability tracking JSON for issue systems
- Executive summary slide deck outline
- Remediation tracking checklist
Error Handling
Common Issues and Resolutions:
-
Missing Scan Data
- Error: "No security scan results found"
- Resolution: Specify alternate data sources or run preliminary scans
- Fallback: Generate report from configuration analysis only
-
Incomplete Compliance Framework
- Error: "Cannot assess [STANDARD] compliance - requirements unavailable"
- Resolution: Request framework checklist or use general best practices
- Fallback: Note limitation in report with partial assessment
-
Access Denied to Configuration Files
- Error: "Permission denied reading {baseDir}/config/"
- Resolution: Request elevated permissions or provide configuration exports
- Fallback: Generate report with available data, note gaps
-
Large Dataset Processing
- Error: "Scan results exceed processing capacity"
- Resolution: Process in batches by severity or component
- Fallback: Focus on critical/high findings first
Resources
Security Standards References:
- OWASP Top 10: https://owasp.org/www-project-top-ten/
- CWE Top 25: https://cwe.mitre.org/top25/
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
Compliance Frameworks:
- PCI-DSS Requirements: https://www.pcisecuritystandards.org/
- GDPR Compliance Checklist: https://gdpr.eu/checklist/
- HIPAA Security Rule: https://www.hhs.gov/hipaa/for-professionals/security/
Vulnerability Databases:
- National Vulnerability Database: https://nvd.nist.gov/
- CVE Details: https://www.cvedetails.com/
Report Templates:
- Use {baseDir}/templates/security-audit-template.md if available
- Default structure follows NIST SP 800-115 guidelines
Integration Points:
- Export findings to JIRA/GitHub Issues for tracking
- Generate compliance evidence for SOC 2 audits
- Link to SIEM/logging systems for evidence validation
GitHub リポジトリ
関連スキル
content-collections
メタThis skill provides a production-tested setup for Content Collections, a TypeScript-first tool that transforms Markdown/MDX files into type-safe data collections with Zod validation. Use it when building blogs, documentation sites, or content-heavy Vite + React applications to ensure type safety and automatic content validation. It covers everything from Vite plugin configuration and MDX compilation to deployment optimization and schema validation.
cloudflare-turnstile
メタThis skill provides comprehensive guidance for implementing Cloudflare Turnstile as a CAPTCHA-alternative bot protection system. It covers integration for forms, login pages, API endpoints, and frameworks like React/Next.js/Hono, while handling invisible challenges that maintain user experience. Use it when migrating from reCAPTCHA, debugging error codes, or implementing token validation and E2E tests.
llamaindex
メタLlamaIndex is a data framework for building RAG-powered LLM applications, specializing in document ingestion, indexing, and querying. It provides key features like vector indices, query engines, and agents, and supports over 300 data connectors. Use it for document Q&A, chatbots, and knowledge retrieval when building data-centric applications.
cloudflare-cron-triggers
テストThis skill provides comprehensive knowledge for implementing Cloudflare Cron Triggers to schedule Workers using cron expressions. It covers setting up periodic tasks, maintenance jobs, and automated workflows while handling common issues like invalid cron expressions and timezone problems. Developers can use it for configuring scheduled handlers, testing cron triggers, and integrating with Workflows and Green Compute.
