Forgent security-vulnerability-scanner

systematic security vulnerability assessment-based skill consuming code-changes, security-requirements to produce security-findings

install
source · Clone the upstream repo
git clone https://github.com/mirandaguillaume/forgent
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/mirandaguillaume/forgent "$T" && mkdir -p ~/.claude/skills && cp -r "$T/internal/bench/fixtures/imported/voltagent/output-standard/skills/security-vulnerability-scanner" ~/.claude/skills/mirandaguillaume-forgent-security-vulnerability-scanner && rm -rf "$T"
manifest: internal/bench/fixtures/imported/voltagent/output-standard/skills/security-vulnerability-scanner/SKILL.md
source content

Security Vulnerability Scanner

Guardrails

  • timeout: 15 minutes for security scan
  • max_files_per_scan: 100
  • block_critical_vulnerabilities: true

Context

Consumes: code-changes, security-requirements Produces: security-findings Memory: short-term

Strategy

Approach: systematic security vulnerability assessment Tools: read_file, grep, search, bash

Steps

  1. scan code for input validation issues
  2. check authentication and authorization patterns
  3. identify injection vulnerabilities
  4. validate cryptographic practices
  5. analyze sensitive data handling
  6. scan dependencies for vulnerabilities

Security

  • Filesystem: read-only
  • Network: none