Skip to main content

Security Reviewer

Skill Verified Active

Identifies security vulnerabilities, generates structured audit reports with severity ratings, and provides actionable remediation guidance. Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews, dependency audits, secrets scanning, or compliance checks. Produces vulnerability reports, prioritized recommendations, and compliance checklists.

Purpose

To provide users with a specialized capability for conducting thorough security audits and vulnerability assessments, ensuring applications and infrastructure are secure.

Features

  • Identifies security vulnerabilities
  • Generates structured audit reports
  • Provides actionable remediation guidance
  • Supports SAST, dependency audits, and secrets scanning
  • Rates severity using CVSS

Use Cases

  • Use when conducting security audits
  • Use when reviewing code for vulnerabilities
  • Use when analyzing infrastructure security
  • Use for penetration testing or DevSecOps automation

Non-Goals

  • Skipping manual review of findings
  • Testing on production systems without authorization
  • Causing service disruption or data loss
  • Testing outside defined scope or rules of engagement

Installation

First, add the marketplace

/plugin marketplace add jeffallan/claude-skills
/plugin install claude-skills@fullstack-dev-skills

Quality Score

Verified
99 /100
Analyzed about 15 hours ago

Trust Signals

Last commit13 days ago
Stars9k
LicenseMIT
Status
View Source

Similar Extensions

Clawsec Scanner

100

Automated vulnerability scanner for agent platforms. Performs dependency scanning (npm audit, pip-audit), multi-database CVE lookup (OSV, NVD, GitHub Advisory), SAST analysis (Semgrep, Bandit), and agent-specific DAST hook execution testing for OpenClaw hooks.

Skill
prompt-security

Context Mode Ops

100

Manage context-mode GitHub issues, PRs, releases, and marketing with parallel subagent army. Orchestrates 10-20 dynamic agents per task. Use when triaging issues, reviewing PRs, releasing versions, writing LinkedIn posts, announcing releases, fixing bugs, merging contributions, validating ENV vars, testing adapters, or syncing branches.

Skill
mksglu

Security Pen Testing

99

Use when the user asks to perform security audits, penetration testing, vulnerability scanning, OWASP Top 10 checks, or offensive security assessments. Covers static analysis, dependency scanning, secret detection, API security testing, and pen test report generation.

Skill
alirezarezvani

Prepare Inspection Readiness

100

Prepare an organisation for regulatory inspection by assessing readiness against agency-specific focus areas (FDA, EMA, MHRA). Covers warning letter and 483 theme analysis, mock inspection protocols, document bundle preparation, inspection logistics, and response template creation. Use when a regulatory inspection has been announced or is anticipated, when a periodic self-assessment is due, when new systems have been implemented since the last inspection, or after a significant audit finding that may attract regulatory attention.

Skill
pjt222

Monitor Data Integrity

100

Design and operate a data integrity monitoring programme based on ALCOA+ principles. Covers detective controls, audit trail review schedules, anomaly detection patterns (off-hours activity, sequential modifications, bulk changes), metrics dashboards, investigation triggers, and escalation matrix definition. Use when establishing a data integrity monitoring programme for GxP systems, preparing for inspections where data integrity is a focus area, after a data integrity incident requiring enhanced monitoring, or when implementing MHRA, WHO, or PIC/S guidance.

Skill
pjt222

Investigate Capa Root Cause

100

Investigate root causes and manage CAPAs (Corrective and Preventive Actions) for compliance deviations. Covers investigation method selection (5-Why, fishbone, fault tree), structured root cause analysis, corrective vs preventive action design, effectiveness verification, and trend analysis. Use when an audit finding requires a CAPA, when a deviation or incident occurs in a validated system, when a regulatory observation needs a formal response, when a data integrity anomaly requires investigation, or when recurring issues suggest a systemic root cause.

Skill
pjt222

© 2025 SkillRepo · Find the right skill, skip the noise.