Conitens security-audit
Check approval boundaries, data handling, and mutation safety before risky changes are accepted.
install
source · Clone the upstream repo
git clone https://github.com/seunghwaneom/Conitens
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/seunghwaneom/Conitens "$T" && mkdir -p ~/.claude/skills && cp -r "$T/.agents/skills/security-audit" ~/.claude/skills/seunghwaneom-conitens-security-audit && rm -rf "$T"
manifest:
.agents/skills/security-audit/SKILL.mdsource content
security-audit
Workflow
- Identify the write surfaces and approval boundaries involved.
- Check for uncontrolled mutation paths, especially around identity and policy.
- Flag namespace leaks, unsafe retrieval, or missing approval gates.
- Return concrete risks before any sign-off.
Constraints
- Treat identity edits as high risk.
- Do not normalize risky actions just because they are convenient.
- Prefer explicit approval evidence over inferred intent.