vulnerability-scanner
Scan Code for Vulnerabilities
This skill helps developers identify and prioritize security vulnerabilities in their codebase using OWASP 2025 guidelines and automated scanning tools.
Baixar o ZIP da skill
Upload no Claude
Vá em Configurações → Capacidades → Skills → Upload skill
Ative e comece a usar
Testar
A utilizar "vulnerability-scanner". Run security scan on my project
Resultado esperado:
Security Scan Results:
OVERALL STATUS: 3 Issues Found
- Critical: 0
- High: 2
- Medium: 1
SCAN SUMMARY:
1. Code Patterns: Found 2 high-risk patterns
- eval() usage detected in utils.js:42
- SQL string concatenation in database.js:15
2. Configuration: 1 medium issue
- Debug mode enabled in config/development.json
RECOMMENDATIONS:
- Replace eval() with safer alternatives
- Use parameterized queries instead of string concatenation
- Disable debug mode in production configurations
A utilizar "vulnerability-scanner". Check for hardcoded secrets
Resultado esperado:
Secret Scan Results:
SCANNED: 156 files
SECRETS FOUND: 1
- API Key detected in src/config.js:12
Type: Generic API Key
Severity: High
RECOMMENDATION: Move secrets to environment variables or a secrets manager. Never commit API keys to source control.
Auditoria de Segurança
SeguroThis is a defensive security skill that teaches vulnerability scanning principles. All static findings are false positives - the flagged patterns (eval, exec, pickle, secrets, API keys) are documented as patterns to DETECT or are in teaching examples, not actual vulnerabilities. The included security_scan.py script is a defensive scanner that identifies dangerous code patterns in user projects.
Pontuação de qualidade
O Que Você Pode Construir
Pre-deployment Security Check
Run automated security scans on codebase before production deployment to catch common vulnerabilities early.
Security Audit Workflow
Conduct systematic security audits using OWASP checklists and prioritization frameworks.
Secure Coding Education
Learn about common vulnerability patterns and how to avoid them in different programming languages.
Tente Estes Prompts
Use the vulnerability-scanner skill to scan my project at [PROJECT_PATH] for security issues. Run a full scan and report findings.
Use the vulnerability-scanner skill to scan for hardcoded secrets, API keys, and credentials in my codebase. Check for AWS keys, tokens, passwords, and private keys.
Use the vulnerability-scanner skill to audit dependencies for known vulnerabilities. Check for outdated packages and supply chain risks.
Use the vulnerability-scanner skill to perform a comprehensive security assessment including: dependency audit, secret scanning, dangerous code pattern detection, and configuration review. Prioritize findings by severity and provide remediation steps.
Melhores Práticas
- Run security scans early and often in the development lifecycle to catch issues before deployment
- Prioritize findings using CVSS scores combined with business context and asset value
- Verify all findings manually before taking action - automated scanners produce false positives
- Maintain a baseline of known safe patterns to reduce noise in repeated scans
Evitar
- Ignoring scanner warnings without investigation - even low-severity issues can be exploited in combination
- Relying solely on automated tools without manual security review and threat modeling
- Scanning once before deployment and never again - new vulnerabilities emerge constantly
- Treating all scanner findings as equally important without prioritization
Perguntas Frequentes
What is OWASP Top 10 2025?
Does this skill perform actual penetration testing?
How does CVSS scoring work?
What is supply chain security?
Can this scanner detect all security issues?
How do I prioritize vulnerabilities?
Detalhes do Desenvolvedor
Autor
sickn33Licença
MIT
Repositório
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/vulnerability-scannerReferência
main
Estrutura de arquivos