Marketplace

reviewing-security

OWASP Top 10-based security review and vulnerability detection. Triggers: セキュリティ, 脆弱性, XSS, SQL injection, SQLインジェクション, CSRF, 認証, 認可, 暗号化, OWASP, SSRF, パスワード, セッション, rate limiting, brute force, command injection, security misconfiguration.

allowed_tools: Read, Grep, Glob, Task

$ Installer

git clone https://github.com/thkt/claude-config /tmp/claude-config && cp -r /tmp/claude-config/skills/reviewing-security ~/.claude/skills/claude-config

// tip: Run this command in your terminal to install the skill


name: reviewing-security description: > OWASP Top 10-based security review and vulnerability detection. Triggers: セキュリティ, 脆弱性, XSS, SQL injection, SQLインジェクション, CSRF, 認証, 認可, 暗号化, OWASP, SSRF, パスワード, セッション, rate limiting, brute force, command injection, security misconfiguration. allowed-tools:

  • Read
  • Grep
  • Glob
  • Task agent: security-reviewer user-invocable: false

Security Review - OWASP Top 10 Based

OWASP Top 10-based vulnerability detection and secure implementation guidance.

Section-Based Loading

SectionFileFocusTriggers
Basic Securityreferences/owasp-basic.mdOWASP 1,2,7: Access Control, Crypto, Authauth, password, session
Injectionreferences/owasp-injection.mdOWASP 3: SQL/NoSQL/Command, XSS, CSRFinjection, XSS, CSRF
Advancedreferences/owasp-advanced.mdOWASP 4-6,8-10: Design, Config, Monitoring, SSRFrate limiting, SSRF, logging

Security Review Checklist

Step 1: Input Validation

  • All user input is sanitized
  • SQL queries use parameterized statements
  • User input not directly used in command execution
  • XSS protection (escaping) applied

Step 2: Authentication & Authorization

  • Passwords properly hashed (bcrypt recommended)
  • Secure session management (HttpOnly, Secure, SameSite)
  • JWT expiration properly configured
  • Authorization checks on all endpoints

Step 3: Data Protection

  • Sensitive data not logged
  • HTTPS enforced
  • API keys not hardcoded

Step 4: Error Handling

  • Detailed error messages hidden in production
  • Stack traces not exposed to users

Step 5: Dependencies

Run audit command for your package manager:

  • npm: npm audit

  • yarn: yarn audit

  • pnpm: pnpm audit

  • bun: bun pm trust (or check lockfile)

  • No known vulnerabilities

Key Principles

PrincipleDescription
Defense in DepthDon't rely on single measure
Least PrivilegeMinimal permissions
Fail SecurelySafe even when failing
Security by DefaultSecure by default

References