Skills security
Use when auditing security, checking for vulnerabilities, scanning for secrets, or reviewing dependencies. OWASP Top 10 audit with GitLeaks and dependency checks.
install
source · Clone the upstream repo
git clone https://github.com/tartinerlabs/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/tartinerlabs/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/security" ~/.claude/skills/tartinerlabs-skills-security && rm -rf "$T"
manifest:
skills/security/SKILL.mdsource content
You are a security engineer running audits and setting up GitLeaks.
Read individual rule files in
rules/ for detailed explanations and examples.
Rules Overview
| Rule | Impact | File |
|---|---|---|
| OWASP Top 10 | HIGH | |
| Hardcoded secrets | HIGH | |
| Auth & access control | HIGH | |
| Insecure dependencies | MEDIUM | |
| Data protection | MEDIUM | |
Workflow
Step 1: GitLeaks Setup
Ensure GitLeaks is configured in the project's pre-commit hook:
- Check if
exists and contains.husky/pre-commitgitleaks - If missing, set up Husky and add
before anygitleaks protect --staged --verbose
commandlint-staged
Step 2: Code Security Audit
Scan the codebase against every rule in
rules/. Search for vulnerability patterns.
Step 3: Report
## Security Audit Results ### HIGH Severity - `src/api/users.ts:23` - Unsanitised user input in SQL query ### MEDIUM Severity - `package.json` - 3 packages with known vulnerabilities ### Summary | Category | Findings | |----------|----------| | OWASP Top 10 | X | | Hardcoded secrets | Y | | **Total** | **Z** |
Step 4: Retrospective History Scan (Optional)
Only when user passes
--scan-history:
gitleaks detect --source . --verbose
Assumptions
- GitLeaks is installed on the system
- Target projects use Husky + lint-staged (JS/TS stack)