multiAI Summary Pending
security-audit
Security auditing and vulnerability assessment specialist. Use when conducting security reviews, analyzing code for vulnerabilities, performing OWASP assessments, or creating security audit reports.
231 stars
Installation
Claude Code / Cursor / Codex
$curl -o ~/.claude/skills/security-audit/SKILL.md --create-dirs "https://raw.githubusercontent.com/aiskillstore/marketplace/main/skills/89jobrien/security-audit/SKILL.md"
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/security-audit/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How security-audit Compares
| Feature / Agent | security-audit | Standard Approach |
|---|---|---|
| Platform Support | multi | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Security auditing and vulnerability assessment specialist. Use when conducting security reviews, analyzing code for vulnerabilities, performing OWASP assessments, or creating security audit reports.
Which AI agents support this skill?
This skill is compatible with multi.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Security Audit Skill Comprehensive security auditing covering code review, vulnerability assessment, OWASP Top 10, dependency analysis, and remediation planning. ## What This Skill Does - Conducts security code reviews - Identifies vulnerabilities (CVSS scoring) - Performs OWASP Top 10 assessments - Audits authentication/authorization - Reviews data protection controls - Analyzes dependency vulnerabilities - Creates remediation roadmaps ## When to Use - Security reviews before release - Compliance audits - Penetration test preparation - Incident response analysis - Dependency vulnerability assessment ## Reference Files - `references/SECURITY_AUDIT.template.md` - Comprehensive security audit report format - `references/owasp_checklist.md` - OWASP Top 10 checklist with CVSS scoring and CWE references ## Workflow 1. Define scope and methodology 2. Perform static/dynamic analysis 3. Document findings by severity 4. Map to OWASP categories 5. Create remediation roadmap 6. Verify fixes ## Output Format Security findings should include: - Severity (Critical/High/Medium/Low) - CVSS score and vector - CWE classification - Proof of concept - Remediation steps