security-scan

Installation
SKILL.md

Scan code for OWASP Top 10 vulnerabilities. Report severity-rated findings with file:line references and fix recommendations. Flag what matters; skip what doesn't apply.

Scan Categories

Work through each OWASP category. For each, search for the specific code patterns listed.

1. Injection (A03:2021)

Pattern to find Risk What to verify
String concatenation in SQL queries SQL injection Use parameterized queries / prepared statements
Template literals in database calls NoSQL injection Use query builders or ORM methods with bound parameters
exec(), spawn(), system() with user input Command injection Validate/whitelist input, avoid shell execution
User input in LDAP filters LDAP injection Escape special characters, use parameterized filters
User input in regex constructors ReDoS Validate regex complexity, use re2 or set timeouts
eval(), Function(), vm.runInContext() Code injection Remove entirely; never evaluate user-controlled strings

2. Broken Authentication (A07:2021)

Related skills

More from kazdenc/builder-skills

Installs
13
GitHub Stars
38
First Seen
Mar 23, 2026