audit-security

Installation
SKILL.md

Audit Security

Audit trust boundaries before changing behavior. Find where untrusted input, privilege, secrets, or sensitive data are handled unsafely, then apply the smallest safe fix.

Follow this workflow

  1. Map the trust boundaries and privileged operations in scope.
  2. Trace attacker-controlled input from entrypoint to sink.
  3. Classify each risky path as access control, validation, injection, data exposure, secret handling, file or process safety, network trust, tenant isolation, or insecure default.
  4. Flag vulnerabilities, exploit paths, and weak assumptions that could become vulnerabilities.
  5. Prioritize findings as P1 through P4.
  6. Auto-fix only local, low-risk issues. Leave broader security changes as findings with a concrete fix plan.

Map the trust boundaries first

Do not audit a single function in isolation when the real risk depends on who can call it, what data reaches it, and what authority it has.

Inspect the relevant equivalents of:

Related skills

More from sebkay/skills

Installs
2
Repository
sebkay/skills
First Seen
Apr 8, 2026