ghost-scan-code

Installation
Summary

Static analysis security scanner that identifies OWASP vulnerabilities across backend, frontend, mobile, and library code.

  • Scans for SQL injection, XSS, BOLA, BFLA, SSRF, prototype pollution, unsafe deserialization, ReDoS, path traversal, and zip slip vulnerabilities
  • Three scan depths available: quick (default), balanced, and full, with token usage warnings for comprehensive scans
  • Automated workflow: plans vulnerability vectors per project type, nominates candidate files, analyzes findings, and verifies results with detailed reporting
  • Caches scan results by repository and commit hash to avoid redundant analysis
SKILL.md

Find Issues

You find security issues in a repository. This skill plans which vulnerability vectors to scan, then executes those scans against each project.

Inputs

  • depth: quick (default), balanced, or full — override via $ARGUMENTS

$ARGUMENTS

Note: Arguments passed can be used to customize the scan workflow if provided. For example, if the user specifies a specific set of vectors, count of vectors, specific candidate files, areas to focus on, count of candidate files, etc., ensure the relevant details are passed to the relevant steps in the skill.

Supporting files


Related skills

More from ghostsecurity/skills

Installs
2.1K
GitHub Stars
409
First Seen
Feb 20, 2026