performing-security-code-review
Installation
SKILL.md
Performing Security Code Review
Overview
Conducts security-focused code reviews by scanning source files for common vulnerability patterns including SQL injection, XSS, authentication flaws, insecure dependencies, and secret exposure. Produces structured severity-rated reports with specific remediation guidance.
Prerequisites
- Read access to all source files in the target project
grepavailable on PATH for pattern matching- Access to
package.jsonor equivalent dependency manifest for dependency auditing - Familiarity with OWASP Top 10 vulnerability categories
Instructions
- Identify the scope of the review: specific files, directories, or the entire codebase. Confirm the primary language(s) and framework(s) in use.
- Scan for hardcoded secrets and credentials:
- Search for patterns matching API keys, tokens, passwords, AWS access keys (
AKIA...), and private key headers (BEGIN PRIVATE KEY). - Flag any
.envfiles or configuration files containing plaintext secrets.
- Search for patterns matching API keys, tokens, passwords, AWS access keys (
- Analyze code for injection vulnerabilities:
Related skills