Loading...
Loading...
Use when the user requests a security audit workflow (vulnerability scan and verification) for sensitive code.
npx skill4agent add aleister1102/skills securityreferences/triage-and-prereqs.mdreferences/report-templates.md/security/security auth/security path/to/file/security --depslocalhostreferences/triage-and-prereqs.mdaegisSecurity audit: [SCOPE]
Find CRITICAL/HIGH only. For each finding include:
- severity (CRITICAL/HIGH)
- attacker prerequisites
- source → sink evidence (file/function references)
- minimal repro steps (safe)
- remediation (containment first, then long-term)
If no CRITICAL/HIGH exist, explicitly output: NONE.
Deprioritize noise categories unless chained to material impact.arbiterVerify security fixes: [SCOPE]
- Re-run minimal repro steps for each previously reported CRITICAL/HIGH
- Run the repo’s test/build checks relevant to the changed area
- Run dependency audit appropriate to stack (e.g., npm/pip/go)
Output: verification report (fixed/not fixed) and any regressions.--deps--verify--secrets