sast-configuration
Configure SAST tools for secure code scanning
You need consistent SAST tool setup across your projects. This skill provides guidance for configuring Semgrep, SonarQube, and CodeQL with custom rules and CI integration.
Télécharger le ZIP du skill
Importer dans Claude
Allez dans Paramètres → Capacités → Skills → Importer un skill
Activez et commencez à utiliser
Tester
Utilisation de "sast-configuration". Create a SAST plan for a JavaScript monorepo using Semgrep and CodeQL.
Résultat attendu:
- Select Semgrep auto rules plus OWASP Top Ten pack for JavaScript.
- Run CodeQL on main branches and pull requests with SARIF upload.
- Exclude build and vendor directories to improve scan time.
- Fail the build only on critical and high findings.
Utilisation de "sast-configuration". How do I create a custom Semgrep rule for hardcoded API keys?
Résultat attendu:
- Define a pattern matching common key formats like 'sk-' prefixes.
- Use message field to explain why hardcoded keys are a risk.
- Set severity to ERROR for CI pipeline blocking.
- Test rule against sample vulnerable code before deployment.
Utilisation de "sast-configuration". Set up SonarQube quality gate for PCI-DSS compliance.
Résultat attendu:
- Configure quality profile with security-related rules enabled.
- Set up custom metric thresholds for vulnerable code density.
- Integrate SARIF import for external SAST tool results.
- Configure email notifications for quality gate failures.
Audit de sécurité
SûrThis is a pure documentation skill containing only guidance and example commands for configuring SAST tools. All 32 static findings are false positives triggered by security-related terminology in documentation. The skill describes legitimate defensive security practices (Semgrep, SonarQube, CodeQL configuration) with no executable code, file access, network calls, or command execution. Behavior matches stated purpose of providing SAST configuration guidance.
Facteurs de risque
🌐 Accès réseau (2)
⚙️ Commandes externes (11)
📁 Accès au système de fichiers (3)
Score de qualité
Ce que vous pouvez construire
SAST baseline rollout
Plan and configure Semgrep, SonarQube, and CodeQL for an initial organization baseline scan.
CI pipeline integration
Add SAST checks to GitHub Actions or GitLab CI with clear failure gates.
Custom rule authoring
Create targeted rules to detect risky patterns in a specific codebase.
Essayez ces prompts
Set up a basic Semgrep scan for a Python project and suggest a minimal CI step.
Define a CI workflow that blocks merges on critical SAST findings and keeps noise low.
Suggest rule tuning and path exclusions to reduce false positives in a large monorepo.
Design a plan to combine Semgrep, SonarQube, and CodeQL with clear ownership and reporting.
Bonnes pratiques
- Start with a baseline scan and prioritize critical issues first
- Document suppressions and review them regularly
- Cache dependencies and use incremental scans for speed
Éviter
- Blocking merges on low severity findings
- Ignoring false positives without documentation
- Scanning generated or vendor code by default
Foire aux questions
Which platforms does this skill support?
What are the limits of this skill?
Can it integrate with my existing CI pipeline?
Is my data accessed or stored?
How do I troubleshoot noisy results?
How does it compare to using one tool only?
Détails du développeur
Auteur
wshobsonLicence
MIT
Dépôt
https://github.com/wshobson/agents/tree/main/plugins/security-scanning/skills/sast-configurationRéf
main
Structure de fichiers
📄 SKILL.md