3.9 KiB
model, allowed-tools, argument-hint, description
| model | allowed-tools | argument-hint | description |
|---|---|---|---|
| claude-sonnet-4-0 | Task, Bash, Read, Write | <concern> [focus] | Application security with OWASP best practices and threat modeling |
Security Command
Application security with OWASP best practices and threat modeling
Purpose
Comprehensive security review and hardening for applications, APIs, infrastructure, and automation scripts. Identifies vulnerabilities, recommends mitigations, and ensures security best practices are followed.
SECURITY FOCUS AREAS
This command helps you identify and fix security issues across:
Input Validation & Injection Prevention
- SQL injection vulnerabilities
- Command injection risks
- LDAP/XPath/XML injection
- Path traversal attacks
- Input sanitization gaps
Authentication & Authorization
- Broken authentication flows
- Session management issues
- Weak credential storage
- Authorization bypass vulnerabilities
- JWT/token handling problems
Secrets Management
- Hardcoded credentials detection
- API keys in code or configs
- Unencrypted sensitive data
- Secrets in logs or error messages
- Insecure secret transmission
OWASP Top 10 Coverage
- Broken Access Control
- Cryptographic Failures
- Injection Flaws
- Insecure Design
- Security Misconfiguration
- Vulnerable Components
- Authentication Failures
- Software/Data Integrity Failures
- Security Logging Failures
- Server-Side Request Forgery
Bash Script Security
- Command injection vulnerabilities
- Unquoted variable usage
- Hardcoded secrets detection
- Insufficient input validation
- Dangerous command patterns
- Permission misconfigurations
Arguments
$1 (Required): Security concern or component to review
- Authentication flow, API endpoint, shell script, configuration, etc.
$2 (Optional): Specific focus area
owasp: OWASP Top 10 systematic reviewinjection: Injection vulnerability focusauth: Authentication/authorization reviewsecrets: Secrets management auditbash: Shell script security reviewapi: API security assessment
Examples
OWASP Security Review
/security "Review authentication flow" owasp
Systematic OWASP Top 10 review of authentication implementation
Injection Vulnerability Audit
/security "Audit input validation" injection
Deep dive on SQL, command, and other injection vulnerabilities
Bash Script Security Review
/security "Review deployment script" bash
Comprehensive shell script security analysis including command injection, secret detection, and permission review
API Security Assessment
/security "Analyze REST API endpoints" api
API-specific security review covering authentication, rate limiting, input validation, and OWASP API Security Top 10
Secrets Management Audit
/security "Audit application for secrets" secrets
Scan for hardcoded credentials, API keys, tokens, and recommend secure secret management
Security Review Protocol
The security-guardian agent will:
- Threat Model: Identify attack vectors and security boundaries
- Code Review: Analyze for common vulnerability patterns
- Configuration Review: Check security settings and misconfigurations
- Secrets Scan: Detect hardcoded credentials and insecure storage
- Permission Analysis: Verify least privilege and access control
- Recommendations: Provide specific, actionable remediation steps
- Priority Assessment: Categorize findings by severity (Critical/High/Medium/Low)
What You Get
- Vulnerability Report: Detailed findings with severity levels
- Exploit Scenarios: How vulnerabilities could be exploited
- Remediation Steps: Specific code fixes and configuration changes
- Security Patterns: Recommended secure alternatives
- Testing Guidance: How to validate fixes
- Compliance Mapping: OWASP, CWE, and compliance framework mapping
Invoke the security-guardian agent with: $ARGUMENTS