Security Audit
Skill Verified ActiveDeep security audit covering OWASP Top 10, authentication, authorization, data protection, dependency vulnerabilities, and secrets scanning. Delegates to the Centinela (QA) agent.
To provide a comprehensive security audit of a codebase, ensuring it meets industry standards and identifying potential vulnerabilities before release or during periodic reviews.
Features
- Deep OWASP Top 10 systematic check
- Authentication and authorization audit
- Secrets scanning for hardcoded credentials
- Dependency vulnerability assessment (CVEs)
- Smart contract security checks (Solidity)
- Generates markdown security reports
- Delegates to Centinela (QA) agent
Use Cases
- Before a release to verify security posture
- After significant code changes affecting security
- Periodic security review of the codebase
- When adding new dependencies or integrations
Non-Goals
- Fixing identified vulnerabilities
- Performing infrastructure security audits
- Auditing non-code assets like documentation
Installation
/plugin install agent-triforce@davepoon-buildwithclaudeQuality Score
VerifiedSimilar Extensions
Ship Gate
100Pre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for "run ship gate", "am I ready to ship", "pre-launch audit", "can I deploy", "push to production", "go live checklist", "preflight check". Not for CI/CD setup or infra provisioning.
Security Audit Codebase
98Perform a security audit of a codebase checking for exposed secrets, vulnerable dependencies, injection vulnerabilities, insecure configurations, and OWASP Top 10 issues. Use before publishing or deploying a project, for periodic security reviews, after adding authentication or API integration, before open-sourcing a private repository, or when preparing for a security compliance audit.
Security Auditor
98Security vulnerability expert covering OWASP Top 10 and common security issues. Use when conducting security audits or reviewing code for vulnerabilities.
TradeMemory Protocol
100Domain knowledge for the Evolution Engine — LLM-powered autonomous strategy discovery from raw OHLCV data. Covers the generate-backtest-select-evolve loop, vectorized backtesting, out-of-sample validation, and strategy graduation. Use when discovering trading patterns, running backtests, evolving strategies, or reviewing evolution logs. Triggers on "evolve", "discover patterns", "backtest", "evolution", "strategy generation", "candidate strategy".
Gdpr Dsgvo Expert
100GDPR and German DSGVO compliance automation. Scans codebases for privacy risks, generates DPIA documentation, tracks data subject rights requests. Use for GDPR compliance assessments, privacy audits, data protection planning, DPIA generation, and data subject rights management.
Refactor Plan
100Prioritized redesign action plan covering quick wins, medium effort, major rework