The Agent Skills Directory
npx skills add https://smithery.ai/skills/CaptainCrouton89/auditing-security全面的安全分析,用于识别漏洞、评估风险并提供符合行业标准(OWASP Top 10,CVSS 评分)的修复指导。
输入:
docs/system-design.md - 架构上下文docs/api-contracts.yaml - API 规范docs/feature-spec/F-##-*.md - 功能实现输出:
提供上下文请求安全审计:
Q1:审计范围
Q2:威胁模型
Q3:敏感级别
Q4:现有安全措施(可选)
何时使用: 小型代码库、单一漏洞调查、特定攻击向量、<5 个文件
使用直接工具一次审查一个领域的漏洞:
注入漏洞:
db.query("SELECT * FROM users WHERE id = '" + id + "'"))dangerouslySetInnerHTML,未清理的 HTML(.innerHTML = userInput)exec('rm ' + filename))db.query(,eval(,exec(,.innerHTML身份验证/授权:
敏感数据暴露:
apiKey,password,secret,token 赋值安全配置错误:
依赖项漏洞:
npm audit 或等效命令何时使用: 整个应用程序、多个 OWASP 类别、>1000 行代码、多个攻击面
代理 1:注入(OWASP A03) SQL,XSS,命令,NoSQL,LDAP 注入漏洞
代理 2:身份验证/授权(OWASP A01,A07) 缺少身份验证、弱密码、会话失效、访问控制失效、权限提升
代理 3:数据暴露(OWASP A02) 硬编码密钥、过多的 API 响应、记录敏感数据、未加密传输、不安全存储
代理 4:配置(OWASP A05) 缺少安全头、CORS 配置错误、详细错误、默认凭证、不必要的服务
代理 5:依赖项(OWASP A06) 易受攻击的包、过时版本、供应链风险
对于每个漏洞:
### [SEVERITY] 问题名称
**CVSS 评分:** X.X | **类别:** OWASP A##:YEAR | **位置:** `src/path/file.js:123`
**易受攻击的代码:**
[代码片段]
**利用场景:**
[如何利用此漏洞的具体示例]
**影响:**
[攻击者可以实现的目标:数据访问、身份验证绕过、系统入侵等]
**修复:**
[安全的替代代码]
**参考:**
- OWASP:[链接]
- CWE-##:[链接]
严重程度映射:
生成包含以下内容的全面报告:
# 安全审计报告:[系统名称]
## 执行摘要
**整体安全状况:** [CRITICAL / POOR / FAIR / GOOD / EXCELLENT]
**漏洞摘要:**
- 严重:[X](CVSS 9.0-10.0)
- 高:[Y](CVSS 7.0-8.9)
- 中:[Z](CVSS 4.0-6.9)
- 低:[N](CVSS 0.1-3.9)
**需要立即采取的行动:**
1. [最严重的问题]
2. [第二优先级]
## OWASP Top 10 评估
| 类别 | 状态 | 发现 | 优先级 |
|----------|--------|----------|----------|
| A01:失效的访问控制 | ✅/⚠️/❌ | [数量] | - |
| A02:加密机制失效 | ✅/⚠️/❌ | [数量] | - |
| A03:注入 | ✅/⚠️/❌ | [数量] | - |
| [继续所有 10 项] | | | |
## 按严重程度分类的发现
[严重漏洞]
[高漏洞]
[中漏洞]
[低漏洞]
## 修复计划
### 立即(24 小时内)
[严重和高严重性修复]
### 短期(1 周内)
[中等严重性修复]
### 中期(1 个月内)
[低严重性修复,加固]
## 验证清单
- [ ] 在修复的代码上重新运行安全扫描
- [ ] 验证每个漏洞已关闭
- [ ] 对依赖项运行 `npm audit`
- [ ] 测试修复不会破坏功能
- [ ] 添加安全回归测试
注入:
exec,spawn)eval() 或类似的代码执行身份验证:
数据暴露:
配置:
*,验证来源)依赖项:
npm audit)npm audit,更新包示例 1:SQL 注入发现
### [CRITICAL] 用户登录中的 SQL 注入
**CVSS 评分:** 9.8 | **类别:** OWASP A03:2021 | **位置:** `src/auth/login.js:45`
**易受攻击的代码:**
const query = `SELECT * FROM users WHERE email = '${email}'`;
const user = await db.query(query);
**利用场景:**
攻击者发送:email = "admin' OR '1'='1"
→ 返回所有用户,绕过身份验证,获得管理员访问权限
**影响:**
- 完全的身份验证绕过
- 完全数据库访问
- 数据窃取和操纵
**修复:**
const query = 'SELECT * FROM users WHERE email = ?';
const user = await db.query(query, [email]);
示例 2:硬编码密钥发现
### [CRITICAL] 硬编码的 API 密钥
**CVSS 评分:** 9.6 | **类别:** OWASP A02:2021 | **位置:** `src/config.js:12`
**易受攻击的代码:**
const apiKey = "sk-1234567890abcdef";
**影响:**
- 未经授权的 API 访问
- 计费责任
- 以受害者账户访问数据
**修复:**
const apiKey = process.env.API_KEY;
// 存储在 .env 中:API_KEY=sk-1234567890abcdef
每周安装次数
–
来源
首次出现
–
Comprehensive security analysis to identify vulnerabilities, assess risk, and provide remediation guidance aligned with industry standards (OWASP Top 10, CVSS scoring).
Inputs:
docs/system-design.md - Architecture contextdocs/api-contracts.yaml - API specificationsdocs/feature-spec/F-##-*.md - Feature implementationsOutputs:
Ask for security audit with context:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
Q1: Audit Scope
Q2: Threat Model
Q3: Sensitivity Level
Q4: Existing Security (optional)
When to use: Small codebase, single vulnerability investigation, specific attack vector, <5 files
Review vulnerabilities one area at a time using direct tools:
Injection Vulnerabilities:
db.query("SELECT * FROM users WHERE id = '" + id + "'"))dangerouslySetInnerHTML, unsanitized HTML (.innerHTML = userInput)exec('rm ' + filename))db.query(, eval(, exec(, .innerHTMLAuthentication/Authorization:
Sensitive Data Exposure:
apiKey, password, secret, token assignmentsSecurity Misconfiguration:
Dependency Vulnerabilities:
npm audit or equivalentWhen to use: Entire application, multiple OWASP categories, >1000 lines, multiple attack surfaces
Agent 1: Injection (OWASP A03) SQL, XSS, command, NoSQL, LDAP injection vulnerabilities
Agent 2: Authentication/Authorization (OWASP A01, A07) Missing auth, weak passwords, broken sessions, access control failures, privilege escalation
Agent 3: Data Exposure (OWASP A02) Hardcoded secrets, excessive API responses, logging sensitive data, unencrypted transmission, insecure storage
Agent 4: Configuration (OWASP A05) Missing security headers, CORS misconfiguration, verbose errors, default credentials, unnecessary services
Agent 5: Dependencies (OWASP A06) Vulnerable packages, outdated versions, supply chain risks
For each vulnerability:
### [SEVERITY] Issue Name
**CVSS Score:** X.X | **Category:** OWASP A##:YEAR | **Location:** `src/path/file.js:123`
**Vulnerable Code:**
[Code snippet]
**Exploit Scenario:**
[Concrete example of how to abuse this]
**Impact:**
[What attacker can achieve: data access, auth bypass, system compromise, etc.]
**Fix:**
[Secure replacement code]
**References:**
- OWASP: [link]
- CWE-##: [link]
Severity Mapping:
Generate comprehensive report with:
# Security Audit Report: [System Name]
## Executive Summary
**Overall Security Posture:** [CRITICAL / POOR / FAIR / GOOD / EXCELLENT]
**Vulnerability Summary:**
- CRITICAL: [X] (CVSS 9.0-10.0)
- HIGH: [Y] (CVSS 7.0-8.9)
- MEDIUM: [Z] (CVSS 4.0-6.9)
- LOW: [N] (CVSS 0.1-3.9)
**Immediate Actions Required:**
1. [Most critical issue]
2. [Second priority]
## OWASP Top 10 Assessment
| Category | Status | Findings | Priority |
|----------|--------|----------|----------|
| A01: Broken Access Control | ✅/⚠️/❌ | [count] | - |
| A02: Cryptographic Failures | ✅/⚠️/❌ | [count] | - |
| A03: Injection | ✅/⚠️/❌ | [count] | - |
| [Continue for all 10] | | | |
## Findings by Severity
[CRITICAL vulnerabilities]
[HIGH vulnerabilities]
[MEDIUM vulnerabilities]
[LOW vulnerabilities]
## Remediation Plan
### Immediate (24 hours)
[Critical and high-severity fixes]
### Short-term (1 week)
[Medium-severity fixes]
### Medium-term (1 month)
[Low-severity fixes, hardening]
## Verification Checklist
- [ ] Re-run security scans on fixed code
- [ ] Verify each vulnerability is closed
- [ ] Run `npm audit` on dependencies
- [ ] Test fixes don't break functionality
- [ ] Add security regression tests
Injection:
exec, spawn with user input)eval() or similar code executionAuthentication:
Data Exposure:
Configuration:
*, validate origins)Dependencies:
npm audit)npm audit, update packagesExample 1: SQL Injection Finding
### [CRITICAL] SQL Injection in User Login
**CVSS Score:** 9.8 | **Category:** OWASP A03:2021 | **Location:** `src/auth/login.js:45`
**Vulnerable Code:**
const query = `SELECT * FROM users WHERE email = '${email}'`;
const user = await db.query(query);
**Exploit Scenario:**
Attacker sends: email = "admin' OR '1'='1"
→ Returns all users, bypasses authentication, gains admin access
**Impact:**
- Complete authentication bypass
- Full database access
- Data exfiltration and manipulation
**Fix:**
const query = 'SELECT * FROM users WHERE email = ?';
const user = await db.query(query, [email]);
Example 2: Hardcoded Secrets Finding
### [CRITICAL] Hardcoded API Key
**CVSS Score:** 9.6 | **Category:** OWASP A02:2021 | **Location:** `src/config.js:12`
**Vulnerable Code:**
const apiKey = "sk-1234567890abcdef";
**Impact:**
- Unauthorized API access
- Billing liability
- Data access under victim's account
**Fix:**
const apiKey = process.env.API_KEY;
// Store in .env: API_KEY=sk-1234567890abcdef
Weekly Installs
–
Source
First Seen
–
GitHub Actions 官方文档查询助手 - 精准解答 CI/CD 工作流问题
30,000 周安装