security by rshankras/claude-code-apple-skills
npx skills add https://github.com/rshankras/claude-code-apple-skills --skill security为 iOS、macOS 和 watchOS 应用程序提供全面的安全指导。审查代码中的漏洞并提供安全的实现模式。
当用户出现以下情况时使用此技能:
识别应用的安全层面:
# 查找与安全相关的代码
Grep: "SecItem|Keychain|kSecClass"
Grep: "LAContext|biometryType|evaluatePolicy"
Grep: "URLSession|ATS|NSAppTransportSecurity"
Grep: "CryptoKit|SecKey|CC_SHA"
确定:
加载并应用:secure-storage.md
关键领域:
加载并应用:biometric-auth.md
关键领域:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
加载并应用:network-security.md
关键领域:
加载并应用:platform-specifics.md
关键领域:
按此结构呈现发现结果:
# 安全审查:[应用名称]
**平台**:iOS / macOS / watchOS / Universal
**审查日期**:[日期]
**风险等级**:Critical / High / Medium / Low
## 摘要
| 类别 | 状态 | 问题 |
|----------|--------|--------|
| 安全存储 | ✅/⚠️/❌ | X 个问题 |
| 身份验证 | ✅/⚠️/❌ | X 个问题 |
| 网络安全 | ✅/⚠️/❌ | X 个问题 |
| 平台安全 | ✅/⚠️/❌ | X 个问题 |
---
## 🔴 严重漏洞
暴露用户数据或可能引发攻击的安全问题。
### [问题标题]
**文件**:`path/to/file.swift:123`
**风险**:[如果被利用会发生什么]
**OWASP 类别**:[如适用]
**易受攻击的代码**:
```swift
// 当前不安全的代码
安全实现:
// 修复后的安全代码
削弱安全态势的问题。
[格式同上]
应解决以实现纵深防御的问题。
[格式同上]
安全加固建议。
[格式同上]
应用做得好的方面:
[Critical] [第一个修复]
[Critical] [第二个修复]
[High] [第三个修复] ...
Grep: "UserDefaults.*password|UserDefaults.*token|UserDefaults.*secret|UserDefaults.*apiKey"
Grep: "\.write\(.*credential|\.write\(.*password"
Grep: "let.*apiKey.*=.*\"|let.*secret.*=.*\""
Grep: "http://(?!localhost|127\.0\.0\.1)"
Grep: "AllowsArbitraryLoads.*true"
Grep: "serverTrust|URLAuthenticationChallenge.*useCredential"
Grep: "print\(.*password|print\(.*token|NSLog.*credential"
Grep: "Logger.*password|os_log.*secret"
每周安装量
87
仓库
GitHub Stars
115
首次出现
Jan 25, 2026
安全审计
安装于
gemini-cli82
codex82
opencode82
github-copilot80
amp78
kimi-cli77
Comprehensive security guidance for iOS, macOS, and watchOS applications. Reviews code for vulnerabilities and provides secure implementation patterns.
Use this skill when the user:
Identify the app's security surface:
# Find security-related code
Grep: "SecItem|Keychain|kSecClass"
Grep: "LAContext|biometryType|evaluatePolicy"
Grep: "URLSession|ATS|NSAppTransportSecurity"
Grep: "CryptoKit|SecKey|CC_SHA"
Determine:
Load and apply: secure-storage.md
Key areas:
Load and apply: biometric-auth.md
Key areas:
Load and apply: network-security.md
Key areas:
Load and apply: platform-specifics.md
Key areas:
Present findings in this structure:
# Security Review: [App Name]
**Platform**: iOS / macOS / watchOS / Universal
**Review Date**: [Date]
**Risk Level**: Critical / High / Medium / Low
## Summary
| Category | Status | Issues |
|----------|--------|--------|
| Secure Storage | ✅/⚠️/❌ | X issues |
| Authentication | ✅/⚠️/❌ | X issues |
| Network Security | ✅/⚠️/❌ | X issues |
| Platform Security | ✅/⚠️/❌ | X issues |
---
## 🔴 Critical Vulnerabilities
Security issues that expose user data or enable attacks.
### [Issue Title]
**File**: `path/to/file.swift:123`
**Risk**: [What could happen if exploited]
**OWASP Category**: [If applicable]
**Vulnerable Code**:
```swift
// current insecure code
Secure Implementation :
// fixed secure code
Issues that weaken security posture.
[Same format as above]
Issues that should be addressed for defense in depth.
[Same format as above]
Security hardening suggestions.
[Same format as above]
What the app does well:
## Priority Classification
### 🔴 Critical
- Credentials stored in plain text or UserDefaults
- Disabled SSL/TLS validation
- Hardcoded secrets or API keys
- SQL injection or code injection vulnerabilities
- Missing authentication on sensitive operations
### 🟠 High
- Keychain without appropriate access controls
- Missing biometric authentication for sensitive data
- Weak cryptographic implementations
- Overly permissive entitlements
- Sensitive data in logs
### 🟡 Medium
- Missing certificate pinning
- Biometric fallback too permissive
- Data Protection class could be stronger
- Missing jailbreak/integrity detection
### 🟢 Low/Recommendations
- Additional hardening measures
- Defense in depth improvements
- Code organization for security clarity
## Quick Checks
### Insecure Storage Detection
```bash
Grep: "UserDefaults.*password|UserDefaults.*token|UserDefaults.*secret|UserDefaults.*apiKey"
Grep: "\.write\(.*credential|\.write\(.*password"
Grep: "let.*apiKey.*=.*\"|let.*secret.*=.*\""
Grep: "http://(?!localhost|127\.0\.0\.1)"
Grep: "AllowsArbitraryLoads.*true"
Grep: "serverTrust|URLAuthenticationChallenge.*useCredential"
Grep: "print\(.*password|print\(.*token|NSLog.*credential"
Grep: "Logger.*password|os_log.*secret"
Weekly Installs
87
Repository
GitHub Stars
115
First Seen
Jan 25, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
gemini-cli82
codex82
opencode82
github-copilot80
amp78
kimi-cli77
Lark Mail CLI 使用指南:邮件管理、安全规则与自动化工作流
37,000 周安装
专业演示文稿设计指南:简约现代风格、高对比度视觉与现场演示优化技巧
92 周安装
docs-sync:OpenAI Agents Python 文档同步工具,自动检测代码与文档差异
89 周安装
产品视频制作指南:5种动画类型与核心方法论,提升视频营销效果
89 周安装
WooCommerce文案指南 - 官方界面文本与文档撰写规范,提升电商用户体验
91 周安装
gcloud CLI 技能:Google Cloud Platform 命令行工具安装、配置与最佳实践指南
91 周安装
Skill Creator 技能创建指南:构建 OpenCode 智能体扩展工作流与工具集成
96 周安装