security-analysis
Security Analysis
Procedures for security vulnerability analysis and code auditing.
When to Use
- Reviewing code for security vulnerabilities
- Conducting security audits
- Implementing security best practices
Core Principles
- Assume All External Input is Malicious - Validate and sanitize all user input
- Principle of Least Privilege - Only grant necessary permissions
- Fail Securely - Never expose sensitive information in errors
Vulnerability Categories
Injection (OWASP A03)
More from kinhluan/skills
ddd-tactical
Tactical Domain-Driven Design (DDD) with Scoring Rubric. Use this skill when designing internal domain models or performing architectural reviews to ensure domain logic is isolated and rich.
7scheduling-algorithms
Job scheduling algorithms for parallel and distributed systems
7ddd-core
Professional Strategic Domain-Driven Design (DDD) Hub. Use this skill for Event Storming, identifying Subdomains, defining Bounded Contexts, and mapping Domain Models to the heart of your architecture.
6c4-level3-component
Specialized in Component diagrams (Level 3) with folder structure mapping. Use this skill when the user needs to zoom into a single container to identify internal components, their responsibilities, and how they map to actual code folders (src/services, internal/).
6docker-containerization
Docker containerization best practices and patterns
6ddd-patterns
Advanced Domain-Driven Design (DDD) Integration Patterns. Use this skill for implementing CQRS, Event Sourcing, the Outbox Pattern, and Anti-Corruption Layers (ACL) in distributed systems.
6