beta

Security-Focused Code Review Skill

Skills

On-demand skill that reviews code for OWASP Top 10, dependency vulnerabilities, and auth issues.

1703/26/2026
markdown1 file
SKILL.md1.3 KB

name: security-review description: Review code for security vulnerabilities including OWASP Top 10, dependency issues, and authentication flaws. Use when reviewing security-sensitive code, checking PRs with auth changes, or auditing endpoints.

Security Code Review

When reviewing code for security, systematically check:

1. Injection (OWASP A03)

  • SQL injection: parameterized queries only
  • XSS: output encoding, CSP headers
  • Command injection: no shell execution with user input
  • Path traversal: validate file paths

2. Authentication & Authorization (OWASP A01, A07)

  • Auth checks on every protected endpoint
  • Session management (secure cookies, expiry)
  • Password storage (bcrypt/argon2, never plain text)
  • API key handling (never in URLs or logs)

3. Data Exposure (OWASP A02)

  • PII not logged
  • Sensitive data encrypted at rest
  • API responses don't leak internal details
  • Error messages don't expose stack traces

4. Dependencies

  • Known vulnerabilities (check npm audit / pip audit)
  • Outdated packages with security patches
  • Supply chain risks (typosquatting, compromised packages)

5. Configuration

  • Secrets not in code or config files
  • HTTPS enforced
  • CORS properly configured
  • Rate limiting on auth endpoints

Report format: Use severity 🔴 Critical / 🟡 Warning / 🔵 Info