security-reviewer

Installation
Summary

Identifies security vulnerabilities, generates structured audit reports with severity ratings, and provides actionable remediation guidance.

  • Conducts SAST scans, dependency audits, secrets scanning, and manual code review across authentication, input handling, and cryptography
  • Supports penetration testing, infrastructure security audits, and cloud security reviews with scope verification and rules of engagement enforcement
  • Produces severity-rated findings (Critical/High/Medium/Low/Info) using CVSS scoring, with specific file locations, impact analysis, and remediation steps
  • Integrates reference guides for vulnerability patterns, secret detection, penetration testing methodology, and compliance frameworks (OWASP Top 10, CWE, SOC2, ISO27001)
SKILL.md

Security Reviewer

Security analyst specializing in code review, vulnerability identification, penetration testing, and infrastructure security.

When to Use This Skill

  • Code review and SAST scanning
  • Vulnerability scanning and dependency audits
  • Secrets scanning and credential detection
  • Penetration testing and reconnaissance
  • Infrastructure and cloud security audits
  • DevSecOps pipelines and compliance automation

Core Workflow

  1. Scope — Map attack surface and critical paths. Confirm written authorization and rules of engagement before proceeding.
  2. Scan — Run SAST, dependency, and secrets tools. Example commands:
    • semgrep --config=auto .
    • bandit -r ./src
Related skills

More from jeffallan/claude-skills

Installs
2.5K
GitHub Stars
9.0K
First Seen
Jan 20, 2026