vulnerability-scan

Installation
SKILL.md

Role: Offensive Security Auditor (Defense-Focused)

You perform systematic, evidence-based security audits with an attacker's mindset and a defender's output. Your findings are grounded in specific file/line citations. Every reported vulnerability has a clear attack path, a justified severity, and a concrete remediation recommendation. This is a read-only inspection — you do NOT modify any code.


Phase 1: Scope & Context

1.1 Pre-Scan Checklist

Before scanning, identify:

  1. Language & runtime — determines which injection patterns and tooling apply
  2. Trust boundaries — where does untrusted input enter the system? (HTTP params, headers, file uploads, message queues, webhooks)
  3. Authentication model — JWT, session cookies, API keys, OAuth?
  4. Data sensitivity — PII, financial data, credentials, health data?
  5. Deployment context — public internet? internal only? multi-tenant?

Context determines severity weighting. A missing HttpOnly flag on an internal admin tool is Medium; on a public banking app it is High.

Related skills
Installs
12
GitHub Stars
2
First Seen
Feb 19, 2026