DevHive-Cli security_scan
Run runDependencyAudit, runSastScan, and runHoundDogScan and return a concise, prioritized security summary with critical/high findings first. Must use this skill if security scanning is explicitly requested by the user.
install
source · Clone the upstream repo
git clone https://github.com/El3tar-cmd/DevHive-Cli
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/El3tar-cmd/DevHive-Cli "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/security_scan" ~/.claude/skills/el3tar-cmd-devhive-cli-security-scan && rm -rf "$T"
manifest:
skills/security_scan/SKILL.mdsource content
Security Scan Skill
Run three independent scanners and summarize results:
for package/dependency vulnerabilitiesrunDependencyAudit()
for static code findingsrunSastScan()
for privacy/security dataflow findingsrunHoundDogScan()
Orchestration
For full scans, run scanners in parallel and tolerate per-scanner failures.
const [depResult, sastResult, hounddogResult] = await Promise.allSettled([ runDependencyAudit(), runSastScan(), runHoundDogScan(), ]); const dep = depResult.status === 'fulfilled' ? depResult.value : null; const sast = sastResult.status === 'fulfilled' ? sastResult.value : null; const hounddog = hounddogResult.status === 'fulfilled' ? hounddogResult.value : null;
Do not fail the whole scan because one scanner errors.
Minimal Response Shape
runDependencyAudit()
:metadata.vulnerabilities{ info, low, moderate, high, critical }
:vulnerabilities[]
,id
,package
,severity
,fixsource
runSastScan()
:results[]
,checkId
,message
,severity
,fingerprintlocation
runHoundDogScan()
:vulnerabilities[]
,hash
,ruleIds
,message
,severity
,location
,privacyViolationsremediation*
Reporting Findings
After analysis is complete, call
reportVulnerabilities with the file paths of all
vulnerability files in .local/potential_vulnerabilities/. Each file must use YAML
front-matter with title, level, and optionally file_ranges:
--- title: "Hardcoded database credentials" level: critical file_ranges: - filepath: "config/database.py" range_start: 1 range_end: 2 --- Description of the vulnerability.
Call the callback via code execution:
await reportVulnerabilities([ { filePath: ".local/potential_vulnerabilities/hardcoded-secrets-database.md" }, { filePath: ".local/potential_vulnerabilities/sql-injection-login.md" }, ]);
This emits a
ProposedVulnerabilitiesEventData event for the UI. Call this after
writing vulnerability files — writing the files alone is not sufficient to surface
findings to the user. If the scan finds no vulnerabilities, skip this callback.
Output Expectations
Return concise results instead of dumping full payloads:
- Per scanner: status (
orok
) and count by severity.error - Top critical/high findings with file path and short message.
- A short remediation plan, with risky/breaking changes clearly called out.