ln-621-security-auditor by levnikolaevich/claude-code-skills
npx skills add https://github.com/levnikolaevich/claude-code-skills --skill ln-621-security-auditor路径说明: 文件路径(
shared/、references/、../ln-*)是相对于技能仓库根目录的。如果在当前工作目录下未找到,请定位此 SKILL.md 文件所在的目录并向上返回一级以找到仓库根目录。如果缺少shared/目录,请通过 WebFetch 从https://raw.githubusercontent.com/levnikolaevich/claude-code-skills/master/skills/{path}获取文件。
专门审计代码库中安全漏洞的工作器。
必读: 加载 shared/references/audit_worker_core_contract.md。
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
接收包含以下内容的 contextStore:tech_stack、best_practices、principles、codebase_root、output_dir。
必读: 加载 shared/references/two_layer_detection.md 了解检测方法。
innerHTML、| safe)→ 确认
* 依赖项:项目中未调用易受攻击的 API → 降级。存在可利用路径 → 确认
* 验证:内部服务到服务端点 → 降级。公共 API → 确认shared/templates/audit_worker_report_template.md 在内存中构建完整的 Markdown 报告,通过单次 Write 调用写入 {output_dir}/621-security.md内容: 源代码中的 API 密钥、密码、令牌、私钥
检测:
API_KEY = "..."、password = "..."、token = "..."、SECRET = "...".ts、.js、.py、.go、.java、.cs.env.example、README.md、包含模拟数据的测试文件严重性:
建议: 移至环境变量 (.env),使用密钥管理(Vault、AWS Secrets Manager)
工作量: S(将硬编码值替换为 process.env.VAR_NAME)
内容: SQL 查询中使用字符串连接而非参数化查询
检测:
query = "SELECT * FROM users WHERE id=" + userId、db.execute(f"SELECT * FROM {table}")、SELECT * FROM ${table}严重性:
建议: 使用参数化查询(预编译语句)、ORM 查询构建器
工作量: M(重构查询以使用占位符)
内容: 未清理的用户输入在 HTML/模板中渲染
检测:
innerHTML = userInput、dangerouslySetInnerHTML={{__html: data}}、echo $userInput;{{ var | safe }}、<%- var %>)严重性:
建议: 使用框架转义(React 自动转义,使用 textContent),使用 DOMPurify 进行清理
工作量: S-M(将 innerHTML 替换为 textContent 或进行清理)
内容: 具有已知 CVE(常见漏洞与暴露)的依赖项
检测:
npm audit (Node.js)、pip-audit (Python)、cargo audit (Rust)、dotnet list package --vulnerable (.NET)严重性:
建议: 更新到已修复的版本,替换未维护的包
工作量: S-M(更新 package.json,测试),L(如果存在破坏性变更)
内容: 系统边界处缺失验证(API 端点、用户表单、文件上传)
检测:
严重性:
建议: 添加验证中间件(Joi、Yup、express-validator),实施输入清理
工作量: M(添加验证模式和中间件)
必读: 加载 shared/references/audit_worker_core_contract.md 和 shared/references/audit_scoring.md。
必读: 加载 shared/references/audit_worker_core_contract.md 和 shared/templates/audit_worker_report_template.md。
将报告写入 {output_dir}/621-security.md,其中包含 category: "Security" 和检查项:hardcoded_secrets、sql_injection、xss_vulnerabilities、insecure_dependencies、missing_input_validation。
向协调器返回摘要:
Report written: docs/project/.audit/ln-620/{YYYY-MM-DD}/621-security.md
Score: X.X/10 | Issues: N (C:N H:N M:N L:N)
必读: 加载 shared/references/audit_worker_core_contract.md。
file:line 以便程序化导航必读: 加载 shared/references/audit_worker_core_contract.md。
{output_dir}/621-security.md(原子性的单次 Write 调用)shared/references/audit_output_schema.md版本: 3.0.0 最后更新: 2025-12-23
每周安装次数
162
仓库
GitHub 星标数
245
首次出现
2026年1月24日
安全审计
安装于
claude-code149
codex144
gemini-cli144
opencode144
cursor143
github-copilot138
Paths: File paths (
shared/,references/,../ln-*) are relative to skills repo root. If not found at CWD, locate this SKILL.md directory and go up one level for repo root. Ifshared/is missing, fetch files via WebFetch fromhttps://raw.githubusercontent.com/levnikolaevich/claude-code-skills/master/skills/{path}.
Specialized worker auditing security vulnerabilities in codebase.
MANDATORY READ: Load shared/references/audit_worker_core_contract.md.
Receives contextStore with: tech_stack, best_practices, principles, codebase_root, output_dir.
MANDATORY READ: Load shared/references/two_layer_detection.md for detection methodology.
innerHTML, | safe) → confirmedshared/templates/audit_worker_report_template.md, write to {output_dir}/621-security.md in single Write callWhat: API keys, passwords, tokens, private keys in source code
Detection:
API_KEY = "...", password = "...", token = "...", SECRET = "...".ts, .js, .py, .go, .java, .cs.env.example, README.md, test files with mock dataSeverity:
Recommendation: Move to environment variables (.env), use secret management (Vault, AWS Secrets Manager)
Effort: S (replace hardcoded value with process.env.VAR_NAME)
What: String concatenation in SQL queries instead of parameterized queries
Detection:
query = "SELECT * FROM users WHERE id=" + userId, db.execute(f"SELECT * FROM {table}"), SELECT * FROM ${table}Severity:
Recommendation: Use parameterized queries (prepared statements), ORM query builders
Effort: M (refactor query to use placeholders)
What: Unsanitized user input rendered in HTML/templates
Detection:
innerHTML = userInput, dangerouslySetInnerHTML={{__html: data}}, echo $userInput;{{ var | safe }}, <%- var %>)Severity:
Recommendation: Use framework escaping (React auto-escapes, use textContent), sanitize with DOMPurify
Effort: S-M (replace innerHTML with textContent or sanitize)
What: Dependencies with known CVEs (Common Vulnerabilities and Exposures)
Detection:
npm audit (Node.js), pip-audit (Python), cargo audit (Rust), dotnet list package --vulnerable (.NET)Severity:
Recommendation: Update to patched versions, replace unmaintained packages
Effort: S-M (update package.json, test), L (if breaking changes)
What: Missing validation at system boundaries (API endpoints, user forms, file uploads)
Detection:
Severity:
Recommendation: Add validation middleware (Joi, Yup, express-validator), implement input sanitization
Effort: M (add validation schema and middleware)
MANDATORY READ: Load shared/references/audit_worker_core_contract.md and shared/references/audit_scoring.md.
MANDATORY READ: Load shared/references/audit_worker_core_contract.md and shared/templates/audit_worker_report_template.md.
Write report to {output_dir}/621-security.md with category: "Security" and checks: hardcoded_secrets, sql_injection, xss_vulnerabilities, insecure_dependencies, missing_input_validation.
Return summary to coordinator:
Report written: docs/project/.audit/ln-620/{YYYY-MM-DD}/621-security.md
Score: X.X/10 | Issues: N (C:N H:N M:N L:N)
MANDATORY READ: Load shared/references/audit_worker_core_contract.md.
file:line for programmatic navigationMANDATORY READ: Load shared/references/audit_worker_core_contract.md.
{output_dir}/621-security.md (atomic single Write call)shared/references/audit_output_schema.mdVersion: 3.0.0 Last Updated: 2025-12-23
Weekly Installs
162
Repository
GitHub Stars
245
First Seen
Jan 24, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykWarn
Installed on
claude-code149
codex144
gemini-cli144
opencode144
cursor143
github-copilot138
OpenClaw 安全 Linux 云部署指南:私有优先、SSH隧道、Podman容器化
33,700 周安装
Pushbullet自动化技能:Claude AI集成与跨设备通知推送自动化工具
1 周安装
Procfu自动化指南:通过Rube MCP和Composio实现Procfu操作自动化
1 周安装
Prerender自动化工具:通过Rube MCP和Composio实现网页预渲染自动化
1 周安装
NuxtJS Vue TypeScript 开发指南:Vue 3 组合式 API、TypeScript 与性能优化最佳实践
145 周安装
Plisio自动化集成:通过Rube MCP实现加密货币支付自动化操作
1 周安装
Plain自动化工具包:通过Rube MCP实现客户支持平台Plain的自动化操作
1 周安装