Awesome-omni-skill Python Security Scan
Comprehensive security vulnerability scanner for Python projects including Flask, Django, and FastAPI applications. Detects OWASP Top 10 vulnerabilities, injection flaws, insecure deserialization, authentication issues, hardcoded secrets, and framework-specific security problems. Audits dependencies for known CVEs and generates actionable security reports.
git clone https://github.com/diegosouzapw/awesome-omni-skill
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/development/python-security-scan-neversight" ~/.claude/skills/diegosouzapw-awesome-omni-skill-python-security-scan && rm -rf "$T"
skills/development/python-security-scan-neversight/SKILL.mdPython Security Scan Skill
This skill enables comprehensive security scanning of Python projects based on OWASP guidelines, Python security best practices, and framework-specific vulnerabilities.
When to Use This Skill
- Security audits of Python applications
- Code review for security vulnerabilities
- Pre-deployment security checks
- Dependency vulnerability assessment
- Detecting hardcoded secrets and credentials
- Framework-specific security reviews (Flask, Django, FastAPI)
Supported Frameworks
This skill automatically detects and applies framework-specific checks for:
- Flask - Template injection, session security, CORS, extensions
- Django - ORM injection, CSRF, template security, settings
- FastAPI - Dependency injection, Pydantic validation, OAuth2
- General Python - Core language vulnerabilities applicable to all projects
Scan Types
1. Quick Scan
Fast scan focusing on critical vulnerabilities:
- Hardcoded secrets, API keys, and credentials
- Dangerous function usage (
,eval
,exec
)pickle.loads - Command injection via
,subprocessos.system - SQL injection patterns
- Known vulnerable dependencies
2. Full Scan
Comprehensive security assessment covering:
- All OWASP Top 10:2025 categories
- Python-specific vulnerabilities
- Framework-specific security issues
- Injection vulnerabilities (SQL, NoSQL, Command, LDAP)
- Insecure deserialization
- Authentication and authorization flaws
- Cryptographic failures
- Security misconfigurations
- Dependency audit (CVE check)
- Environment variable and secrets exposure
3. Targeted Scan
Focus on specific vulnerability categories:
- SQL/NoSQL/Command/LDAP injection--injection
- Pickle, YAML, JSON deserialization--deserialization
- Authentication/authorization issues--auth
- Hardcoded credentials--secrets
- Dependency vulnerabilities--deps
- Cryptographic issues--crypto
- Flask-specific vulnerabilities--flask
- Django-specific vulnerabilities--django
- FastAPI-specific vulnerabilities--fastapi
Scan Procedure
Step 1: Project Discovery
- Identify project type and framework:
- Check for
,requirements.txt
,Pipfile
,pyproject.tomlsetup.py - Detect Flask (
), Django (from flask import
), FastAPI (django.conf
)from fastapi import
- Check for
- Locate configuration files
- Map the codebase structure
Step 2: Framework Detection
# Detection patterns Flask: "from flask import", "Flask(__name__)" Django: "django.conf.settings", "INSTALLED_APPS", "manage.py" FastAPI: "from fastapi import", "FastAPI()"
Step 3: Dependency Audit
Run the dependency audit script:
./scripts/dependency-audit.sh /path/to/project
Or manually:
pip-audit # or safety check
Step 4: Secret Scanning
Scan for hardcoded secrets:
python scripts/secret-scanner.py /path/to/project
Important: Environment File Handling
- By default, real
files are SKIPPED (.env
,.env
,.env.local
, etc.).env.production - These files contain actual secrets and should not be in version control
- Only
and.env.example
files are analyzed for documentation quality.env.template - Use
flag only if explicitly requested by user--include-env-files
The scanner will:
- Scan source code for hardcoded secrets
- Analyze
templates to check:.env.example- Which sensitive variables are documented
- Whether variables have descriptions (comments)
- If placeholder values look like real secrets
- Suggestions for missing common variables (SECRET_KEY, DATABASE_URL, etc.)
Step 5: Pattern Analysis
For each file in the codebase, check against patterns in:
- Core Python issuesreferences/python-vulnerabilities.md
- Injection flawsreferences/injection-patterns.md
- Insecure deserializationreferences/deserialization.md
- Flask vulnerabilitiesreferences/flask-security.md
- Django vulnerabilitiesreferences/django-security.md
- FastAPI vulnerabilitiesreferences/fastapi-security.md
Step 6: Report Generation
Generate a security report using:
- Report structureassets/report-template.md
Severity Classification
| Severity | Description | Action Required |
|---|---|---|
| CRITICAL | Exploitable vulnerability with severe impact | Immediate fix required |
| HIGH | Significant security risk | Fix before deployment |
| MEDIUM | Potential security issue | Fix in next release |
| LOW | Minor security concern | Consider fixing |
| INFO | Security best practice suggestion | Optional improvement |
Key Files to Scan
Always Check
- All Python source files**/*.py
,requirements.txt
,Pipfile
- Dependenciespyproject.toml
,setup.py
- Package configurationsetup.cfg
,config.py
- Configuration filessettings.py
,**/secrets*
- Obvious secret locations**/credentials*
Environment Files
,.env.example
- SCAN for template analysis.env.template
,.env
,.env.local
- SKIP by default (contain real secrets).env.production
Note: Real
.env files should never be committed to version control. The scanner analyzes .env.example templates to ensure proper documentation of required variables.
High Priority Locations
,app.py
,main.py
- Entry pointswsgi.py
,**/views.py
- Request handlers**/routes.py
- API endpoints**/api/**/*.py
,**/auth*
- Authentication code**/login*
- Database models**/models.py
- Data serialization**/serializers.py
- Middleware code**/middleware.py
Framework-Specific
Flask:
,app.py
- Application factory__init__.py
- Blueprint routes**/blueprints/**
- Jinja2 templatestemplates/**
Django:
,settings.py
- Django settings**/settings/*.py
- URL configurationurls.py
- View functions/classes**/views.py
- Form definitions**/forms.py
- Django templatestemplates/**
FastAPI:
- Application entrymain.py
- API routers**/routers/**
- Dependency injection**/dependencies.py
- Pydantic models**/schemas.py
Output Format
Findings should be reported as:
[SEVERITY] Category: Description File: path/to/file.py:lineNumber Code: <relevant code snippet> Risk: <explanation of the security risk> Fix: <recommended remediation>
Integration with CI/CD
This skill can generate output compatible with:
- GitHub Security Advisories
- SARIF format for GitHub Code Scanning
- JSON for custom integrations
- JUnit XML for CI pipelines
References
Load additional context as needed:
- OWASP Top 10:2025 quick referencereferences/owasp-top-10.md
- Python-specific vulnerabilitiesreferences/python-vulnerabilities.md
- Injection vulnerability patternsreferences/injection-patterns.md
- Insecure deserialization patternsreferences/deserialization.md
- Flask security guidereferences/flask-security.md
- Django security guidereferences/django-security.md
- FastAPI security guidereferences/fastapi-security.md