MCP HubMCP Hub
返回技能列表

scanning-input-validation-practices

jeremylongshore
更新于 Today
57 次查看
712
74
712
在 GitHub 上查看
aiautomationdata

关于

This skill automatically scans source code to identify missing or weak input validation, helping prevent vulnerabilities like SQL injection and XSS. It's designed for use during code reviews and security audits to harden applications. The analysis is performed by leveraging a dedicated input-validation-scanner plugin.

快速安装

Claude Code

推荐
插件命令推荐
/plugin add https://github.com/jeremylongshore/claude-code-plugins-plus
Git 克隆备选方式
git clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/scanning-input-validation-practices

在 Claude Code 中复制并粘贴此命令以安装该技能

技能文档

Overview

This skill automates the process of identifying potential input validation flaws within a codebase. By analyzing how user-provided data is handled, it helps developers proactively address security vulnerabilities before they can be exploited. This skill streamlines security audits and improves the overall security posture of applications.

How It Works

  1. Initiate Scan: The user requests an input validation scan, triggering the skill.
  2. Code Analysis: The skill uses the input-validation-scanner plugin to analyze the specified codebase or file.
  3. Vulnerability Identification: The plugin identifies instances where input validation may be missing or insufficient.
  4. Report Generation: The skill presents a report highlighting potential vulnerabilities and their locations in the code.

When to Use This Skill

This skill activates when you need to:

  • Audit a codebase for input validation vulnerabilities.
  • Review newly written code for potential XSS or SQL injection flaws.
  • Harden an application against common web security exploits.
  • Ensure compliance with security best practices related to input handling.

Examples

Example 1: Identifying XSS Vulnerabilities

User request: "Scan the user profile module for potential XSS vulnerabilities."

The skill will:

  1. Activate the input-validation-scanner plugin on the specified module.
  2. Generate a report highlighting areas where user input is directly rendered without proper sanitization, indicating potential XSS vulnerabilities.

Example 2: Checking for SQL Injection Risks

User request: "Check the database access layer for potential SQL injection risks."

The skill will:

  1. Use the input-validation-scanner plugin to examine the database access code.
  2. Identify instances where user input is used directly in SQL queries without proper parameterization or escaping, indicating potential SQL injection vulnerabilities.

Best Practices

  • Regular Scanning: Integrate input validation scanning into your regular development workflow.
  • Contextual Analysis: Always review the identified vulnerabilities in context to determine their actual impact and severity.
  • Comprehensive Validation: Ensure that all user-supplied data is validated, including data from forms, APIs, and external sources.

Integration

This skill can be used in conjunction with other security-related skills to provide a more comprehensive security assessment. For example, it can be combined with a static analysis skill to identify other types of vulnerabilities or with a dependency scanning skill to identify vulnerable third-party libraries.

GitHub 仓库

jeremylongshore/claude-code-plugins-plus
路径: backups/skills-batch-20251204-000554/plugins/security/input-validation-scanner/skills/input-validation-scanner
aiautomationclaude-codedevopsmarketplacemcp

相关推荐技能