Agent-Skills-Hub web-security-auditor
Aggregate SAST, SCA, DAST, secrets, API, frontend, and backend security checks into one report.
install
source · Clone the upstream repo
git clone https://github.com/0x-Professor/Agent-Skills-Hub
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/0x-Professor/Agent-Skills-Hub "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/web-security-auditor" ~/.claude/skills/0x-professor-agent-skills-hub-web-security-auditor && rm -rf "$T"
manifest:
skills/web-security-auditor/SKILL.mdsource content
Web Security Auditor
Objective
Perform a comprehensive web application security review aligned to OWASP Top 10 and practical production hardening controls.
Required Workflow
A. Static Analysis (SAST)
- Run Semgrep for injection, secrets, crypto misuse, and prototype pollution.
- Run ESLint security plugins (
,eslint-plugin-security
).eslint-plugin-no-unsanitized - Run Bandit for Python codebases.
B. Dependency Scanning (SCA)
- Run
,npm audit
, orpip-audit
by stack.cargo audit - Include Aikido Security or Snyk where available.
- Include Vulert for no-install open-source dependency checks.
C. Dynamic Analysis (DAST)
- Run OWASP ZAP automation/headless scans.
- Optionally run StackHawk.
- Optionally run Nuclei templates for quick vulnerability sweeps.
D. Secret Detection
- Run Gitleaks across repository and history.
- Run TruffleHog scan.
E. Frontend Security Checks
- Verify CSP (no unsafe inline/eval in production policy).
- Verify clickjacking protection (
orX-Frame-Options
).frame-ancestors - Verify HSTS.
- Verify
.X-Content-Type-Options: nosniff - Verify no sensitive data in
and no exposed production source maps.localStorage - Check for XSS hazards (
,dangerouslySetInnerHTML
,innerHTML
).eval
F. Backend Security Checks
- Verify parameterized DB access / ORM usage.
- Verify strong JWT secret management and token expiry.
- Verify rate limiting on auth/sensitive routes.
- Verify strict CORS origins.
- Verify input validation on all endpoints.
- Verify secure password hashing (bcrypt/argon2).
- Check IDOR controls on user-owned resources.
G. API Security
- Include Akto or Escape.tech checks for business-logic and GraphQL/REST API risks.
Output
with findings grouped bysecurity-report.json
,Critical
,High
,MediumLow
Execution
python skills/web-security-auditor/scripts/security_auditor.py --input <workspace> --output <out.json> --format json
References
references/tools.md