Loading...
Loading...
Use when you need comprehensive security scanning across applications, infrastructure, and dependencies with LLM-based analysis
npx skill4agent add wojons/skills security-scan# Run comprehensive security scan
./scripts/security-scan.sh --target https://app.example.com
# Scan Docker containers
./scripts/security-scan.sh --container myapp:latest
# Scan infrastructure as code
./scripts/security-scan.sh --iac terraform/
# Generate compliance report
./scripts/security-scan.sh --compliance soc2
# LLM-powered security analysis
./scripts/security-scan.sh --llm-analysis --context "Payment processing system"Security Scan Report
─────────────────────────────────────
Scan Date: 2025-01-15T10:30:00Z
Target: https://app.example.com
Scan Duration: 2m 45s
CRITICAL FINDINGS (3):
────────────────────────
❌ SQL Injection in /api/users endpoint
Risk: Critical (CVSS 9.8)
Detection: OWASP ZAP + LLM analysis
Remediation: Use parameterized queries, implement input validation
Compliance Impact: PCI DSS 6.5.1, OWASP A1
❌ Hard-coded AWS credentials in config file
Risk: Critical (CVSS 8.9)
Detection: TruffleHog + LLM pattern matching
Remediation: Move to AWS Secrets Manager, rotate credentials
Compliance Impact: SOC 2 CC6.1, ISO 27001 A.9.4.1
❌ Unpatched vulnerability in nginx:1.18 (CVE-2021-23017)
Risk: Critical (CVSS 9.1)
Detection: Trivy container scan
Remediation: Upgrade to nginx 1.20+, apply security patches
Compliance Impact: PCI DSS 6.2, ISO 27001 A.12.6.1
HIGH FINDINGS (8):
───────────────────
⚠️ Missing Content Security Policy header
⚠️ Excessive permissions in IAM role (AdminAccess)
⚠️ Outdated OpenSSL library (CVE-2022-2068)
⚠️ Docker container running as root
⚠️ API endpoint without rate limiting
⚠️ Sensitive data in application logs
⚠️ Missing MFA for administrative access
⚠️ Unencrypted S3 bucket
MEDIUM/LOW FINDINGS (14):
──────────────────────────
ℹ️ Security headers missing (X-Frame-Options, X-Content-Type-Options)
ℹ️ Verbose error messages revealing system information
ℹ️ Session timeout too long (24 hours)
ℹ️ Cross-site request forgery (CSRF) protection missing
LLM SECURITY ANALYSIS:
──────────────────────
🔍 Business Logic Vulnerabilities:
• Payment amount manipulation possible in checkout flow
• Privilege escalation via IDOR in admin panel
• Race condition in inventory reservation system
🔍 Architectural Security Issues:
• Monolithic architecture increases attack surface
• Lack of network segmentation between tiers
• Insufficient logging for security events
🔍 Compliance Gaps:
• Missing data retention policy implementation
• Inadequate incident response procedures
• Insufficient employee security training documentation
SUMMARY:
────────
Total Findings: 25
Critical: 3 | High: 8 | Medium: 9 | Low: 5
Risk Score: 78/100 (High Risk)
Compliance Status: 65% compliant with SOC 2
RECOMMENDATIONS:
────────────────
1. IMMEDIATE ACTION: Fix 3 critical vulnerabilities within 24 hours
2. PRIORITY: Address 8 high-risk issues within 7 days
3. IMPROVEMENTS: Implement security controls for medium/low issues
4. ARCHITECTURAL: Consider microservices segmentation, zero-trust network
5. PROCESS: Establish security training program, incident response plan