insecure-defaults

Installation
Summary

Detects fail-open security vulnerabilities where applications run insecurely with missing or weak default configuration.

  • Identifies hardcoded secrets, weak authentication defaults, permissive access controls, and weak cryptography that allow apps to start and operate without proper configuration
  • Distinguishes between fail-open vulnerabilities (app runs insecurely with defaults) and fail-secure patterns (app crashes if config is missing)
  • Focuses on production-reachable code; automatically excludes test fixtures, example files, documentation, and development-only configurations
  • Includes verification workflow to trace code paths, confirm runtime behavior, and assess production impact before reporting findings
SKILL.md

Insecure Defaults Detection

Finds fail-open vulnerabilities where apps run insecurely with missing configuration. Distinguishes exploitable defaults from fail-secure patterns that crash safely.

  • Fail-open (CRITICAL): SECRET = env.get('KEY') or 'default' → App runs with weak secret
  • Fail-secure (SAFE): SECRET = env['KEY'] → App crashes if missing

When to Use

  • Security audits of production applications (auth, crypto, API security)
  • Configuration review of deployment files, IaC templates, Docker configs
  • Code review of environment variable handling and secrets management
  • Pre-deployment checks for hardcoded credentials or weak defaults

When NOT to Use

Do not use this skill for:

  • Test fixtures explicitly scoped to test environments (files in test/, spec/, __tests__/)
  • Example/template files (.example, .template, .sample suffixes)
Related skills
Installs
3.5K
GitHub Stars
5.1K
First Seen
Jan 28, 2026