Security Audit
Skill Verifiziert AktivDeep security audit covering OWASP Top 10, authentication, authorization, data protection, dependency vulnerabilities, and secrets scanning. Delegates to the Centinela (QA) agent.
To provide a comprehensive security audit of a codebase, ensuring it meets industry standards and identifying potential vulnerabilities before release or during periodic reviews.
Funktionen
- Deep OWASP Top 10 systematic check
- Authentication and authorization audit
- Secrets scanning for hardcoded credentials
- Dependency vulnerability assessment (CVEs)
- Smart contract security checks (Solidity)
- Generates markdown security reports
- Delegates to Centinela (QA) agent
Anwendungsfälle
- Before a release to verify security posture
- After significant code changes affecting security
- Periodic security review of the codebase
- When adding new dependencies or integrations
Nicht-Ziele
- Fixing identified vulnerabilities
- Performing infrastructure security audits
- Auditing non-code assets like documentation
Installation
/plugin install agent-triforce@davepoon-buildwithclaudeQualitätspunktzahl
VerifiziertVertrauenssignale
Ähnliche Erweiterungen
Ship Gate
100Pre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for "run ship gate", "am I ready to ship", "pre-launch audit", "can I deploy", "push to production", "go live checklist", "preflight check". Not for CI/CD setup or infra provisioning.
Security Audit Codebase
98Perform a security audit of a codebase checking for exposed secrets, vulnerable dependencies, injection vulnerabilities, insecure configurations, and OWASP Top 10 issues. Use before publishing or deploying a project, for periodic security reviews, after adding authentication or API integration, before open-sourcing a private repository, or when preparing for a security compliance audit.
Security Auditor
98Security vulnerability expert covering OWASP Top 10 and common security issues. Use when conducting security audits or reviewing code for vulnerabilities.
TradeMemory Protocol
100Domänenwissen für die Evolution Engine — LLM-gestützte autonome Strategieentdeckung aus rohen OHLCV-Daten. Behandelt die Schleife Generieren-Backtesten-Auswählen-Entwickeln, vektorisiertes Backtesting, Out-of-Sample-Validierung und Strategiegraduierung. Verwenden Sie es beim Entdecken von Handelspatterns, Ausführen von Backtests, Entwickeln von Strategien oder Überprüfen von Evolutionsprotokollen. Löst aus bei "evolve", "discover patterns", "backtest", "evolution", "strategy generation", "candidate strategy".
Gdpr Dsgvo Expert
100GDPR and German DSGVO compliance automation. Scans codebases for privacy risks, generates DPIA documentation, tracks data subject rights requests. Use for GDPR compliance assessments, privacy audits, data protection planning, DPIA generation, and data subject rights management.
Refactor Plan
100Prioritized redesign action plan covering quick wins, medium effort, major rework