security-review
Installation
SKILL.md
Perform a focused security review using a 3-phase methodology: vulnerability identification across five domains (Input Validation, Authentication/Authorization, Cryptography, Injection, Data Exposure), aggressive false-positive filtering, and confidence scoring with an 80% exploitability threshold. Only reports findings the reviewer is confident are real and exploitable. Use when reviewing code for security vulnerabilities, auditing authentication flows, or assessing data handling practices.
Related skills