Forgent security-vulnerability-scan

OWASP-based vulnerability detection using automated security scanning tools-based skill consuming source_code, dependencies to produce security_findings

install
source · Clone the upstream repo
git clone https://github.com/mirandaguillaume/forgent
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/mirandaguillaume/forgent "$T" && mkdir -p ~/.claude/skills && cp -r "$T/internal/bench/fixtures/imported/wshobson/output-standard/skills/security-vulnerability-scan" ~/.claude/skills/mirandaguillaume-forgent-security-vulnerability-scan && rm -rf "$T"
manifest: internal/bench/fixtures/imported/wshobson/output-standard/skills/security-vulnerability-scan/SKILL.md
source content

Security Vulnerability Scan

Guardrails

  • timeout: 300s
  • max_files_per_scan: 1000
  • require_backup_before_changes: true

Context

Consumes: source_code, dependencies Produces: security_findings Memory: short-term

Strategy

Approach: OWASP-based vulnerability detection using automated security scanning tools Tools: read_file, grep, search, bash

Steps

  1. Scan for OWASP Top 10 vulnerabilities
  2. Check input validation and sanitization
  3. Review authentication and authorization
  4. Analyze cryptographic implementations
  5. Assess dependency vulnerabilities
  6. Validate secrets management

Security

  • Filesystem: read-only
  • Network: allowlist