security-audit
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseSecurity Auditing Workflow Bundle
安全审计工作流套件
Overview
概述
Comprehensive security auditing workflow for web applications, APIs, and infrastructure. This bundle orchestrates skills for penetration testing, vulnerability assessment, security scanning, and remediation.
针对Web应用、API和基础设施的全面安全审计工作流。该套件编排了渗透测试、漏洞评估、安全扫描和修复相关的技能。
When to Use This Workflow
何时使用此工作流
Use this workflow when:
- Performing security audits on web applications
- Testing API security
- Conducting penetration tests
- Scanning for vulnerabilities
- Hardening application security
- Compliance security assessments
在以下场景使用此工作流:
- 对Web应用执行安全审计
- 测试API安全
- 开展渗透测试
- 扫描漏洞
- 加固应用安全
- 合规性安全评估
Workflow Phases
工作流阶段
Phase 1: Reconnaissance
阶段1:侦察
Skills to Invoke
调用技能
- - Security scanning
scanning-tools - - Shodan searches
shodan-reconnaissance - - OWASP Top 10
top-web-vulnerabilities
- - 安全扫描
scanning-tools - - Shodan搜索
shodan-reconnaissance - - OWASP Top 10
top-web-vulnerabilities
Actions
操作
- Identify target scope
- Gather intelligence
- Map attack surface
- Identify technologies
- Document findings
- 确定目标范围
- 收集情报
- 绘制攻击面
- 识别技术栈
- 记录发现结果
Copy-Paste Prompts
可复制粘贴的提示词
Use @scanning-tools to perform initial reconnaissanceUse @shodan-reconnaissance to find exposed servicesUse @scanning-tools to perform initial reconnaissanceUse @shodan-reconnaissance to find exposed servicesPhase 2: Vulnerability Scanning
阶段2:漏洞扫描
Skills to Invoke
调用技能
- - Vulnerability analysis
vulnerability-scanner - - Static analysis
security-scanning-security-sast - - Dependency scanning
security-scanning-security-dependencies
- - 漏洞分析
vulnerability-scanner - - 静态分析
security-scanning-security-sast - - 依赖扫描
security-scanning-security-dependencies
Actions
操作
- Run automated scanners
- Perform static analysis
- Scan dependencies
- Identify misconfigurations
- Document vulnerabilities
- 运行自动化扫描工具
- 执行静态分析
- 扫描依赖项
- 识别配置错误
- 记录漏洞
Copy-Paste Prompts
可复制粘贴的提示词
Use @vulnerability-scanner to scan for OWASP Top 10 vulnerabilitiesUse @security-scanning-security-dependencies to audit dependenciesUse @vulnerability-scanner to scan for OWASP Top 10 vulnerabilitiesUse @security-scanning-security-dependencies to audit dependenciesPhase 3: Web Application Testing
阶段3:Web应用测试
Skills to Invoke
调用技能
- - OWASP vulnerabilities
top-web-vulnerabilities - - SQL injection
sql-injection-testing - - XSS testing
xss-html-injection - - Authentication testing
broken-authentication - - IDOR testing
idor-testing - - Path traversal
file-path-traversal - - Burp Suite testing
burp-suite-testing
- - OWASP漏洞
top-web-vulnerabilities - - SQL注入测试
sql-injection-testing - - XSS测试
xss-html-injection - - 身份验证测试
broken-authentication - - IDOR测试
idor-testing - - 路径遍历测试
file-path-traversal - - Burp Suite测试
burp-suite-testing
Actions
操作
- Test for injection flaws
- Test authentication mechanisms
- Test session management
- Test access controls
- Test input validation
- Test security headers
- 测试注入缺陷
- 测试身份验证机制
- 测试会话管理
- 测试访问控制
- 测试输入验证
- 测试安全标头
Copy-Paste Prompts
可复制粘贴的提示词
Use @sql-injection-testing to test for SQL injection vulnerabilitiesUse @xss-html-injection to test for cross-site scriptingUse @broken-authentication to test authentication securityUse @sql-injection-testing to test for SQL injection vulnerabilitiesUse @xss-html-injection to test for cross-site scriptingUse @broken-authentication to test authentication securityPhase 4: API Security Testing
阶段4:API安全测试
Skills to Invoke
调用技能
- - API fuzzing
api-fuzzing-bug-bounty - - API security
api-security-best-practices
- - API模糊测试
api-fuzzing-bug-bounty - - API安全
api-security-best-practices
Actions
操作
- Enumerate API endpoints
- Test authentication/authorization
- Test rate limiting
- Test input validation
- Test error handling
- Document API vulnerabilities
- 枚举API端点
- 测试身份验证/授权
- 测试速率限制
- 测试输入验证
- 测试错误处理
- 记录API漏洞
Copy-Paste Prompts
可复制粘贴的提示词
Use @api-fuzzing-bug-bounty to fuzz API endpointsUse @api-fuzzing-bug-bounty to fuzz API endpointsPhase 5: Penetration Testing
阶段5:渗透测试
Skills to Invoke
调用技能
- - Penetration testing commands
pentest-commands - - Pentest planning
pentest-checklist - - Ethical hacking
ethical-hacking-methodology - - Metasploit
metasploit-framework
- - 渗透测试命令
pentest-commands - - 渗透测试规划
pentest-checklist - - 道德黑客
ethical-hacking-methodology - - Metasploit
metasploit-framework
Actions
操作
- Plan penetration test
- Execute attack scenarios
- Exploit vulnerabilities
- Document proof of concept
- Assess impact
- 规划渗透测试
- 执行攻击场景
- 利用漏洞
- 记录概念验证
- 评估影响
Copy-Paste Prompts
可复制粘贴的提示词
Use @pentest-checklist to plan penetration testUse @pentest-commands to execute penetration testingUse @pentest-checklist to plan penetration testUse @pentest-commands to execute penetration testingPhase 6: Security Hardening
阶段6:安全加固
Skills to Invoke
调用技能
- - Security hardening
security-scanning-security-hardening - - Authentication
auth-implementation-patterns - - API security
api-security-best-practices
- - 安全加固
security-scanning-security-hardening - - 身份验证
auth-implementation-patterns - - API安全
api-security-best-practices
Actions
操作
- Implement security controls
- Configure security headers
- Set up authentication
- Implement authorization
- Configure logging
- Apply patches
- 实施安全控制
- 配置安全标头
- 设置身份验证
- 实施授权
- 配置日志
- 应用补丁
Copy-Paste Prompts
可复制粘贴的提示词
Use @security-scanning-security-hardening to harden application securityUse @security-scanning-security-hardening to harden application securityPhase 7: Reporting
阶段7:报告
Skills to Invoke
调用技能
- - Security reporting
reporting-standards
- - 安全报告
reporting-standards
Actions
操作
- Document findings
- Assess risk levels
- Provide remediation steps
- Create executive summary
- Generate technical report
- 记录发现结果
- 评估风险等级
- 提供修复步骤
- 创建执行摘要
- 生成技术报告
Security Testing Checklist
安全测试检查清单
OWASP Top 10
OWASP Top 10
- Injection (SQL, NoSQL, OS, LDAP)
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging & Monitoring
- 注入(SQL、NoSQL、OS、LDAP)
- 身份验证失效
- 敏感数据暴露
- XML外部实体(XXE)
- 访问控制失效
- 安全配置错误
- 跨站脚本(XSS)
- 不安全的反序列化
- 使用含有已知漏洞的组件
- 日志与监控不足
API Security
API安全
- Authentication mechanisms
- Authorization checks
- Rate limiting
- Input validation
- Error handling
- Security headers
- 身份验证机制
- 授权检查
- 速率限制
- 输入验证
- 错误处理
- 安全标头
Quality Gates
质量门
- All planned tests executed
- Vulnerabilities documented
- Proof of concepts captured
- Risk assessments completed
- Remediation steps provided
- Report generated
- 所有规划的测试已执行
- 漏洞已记录
- 概念验证已捕获
- 风险评估已完成
- 修复步骤已提供
- 报告已生成
Related Workflow Bundles
相关工作流套件
- - Secure development practices
development - - WordPress security
wordpress - - Cloud security
cloud-devops - - Security testing
testing-qa
- - 安全开发实践
development - - WordPress安全
wordpress - - 云安全
cloud-devops - - 安全测试
testing-qa