Security Audit
advancedsecurityMin 64K context
Performs comprehensive security analysis of code and configurations. Identifies OWASP Top 10 vulnerabilities, insecure patterns, missing input validation, authentication flaws, and secrets exposure. Provides remediation steps with secure code examples.
Use Cases
- Pre-deployment security review
- Identifying injection vulnerabilities (SQL, XSS, command)
- Authentication and authorization flow analysis
- Secrets and credential exposure detection
- Dependency vulnerability assessment
Example Prompt
Perform a security audit on the following code. Check for: 1. OWASP Top 10 vulnerabilities 2. Input validation and sanitization gaps 3. Authentication/authorization weaknesses 4. Secrets or credentials in code 5. Insecure dependencies or configurations 6. Missing security headers or CORS issues For each finding, provide: - Severity (critical/high/medium/low) - CWE identifier if applicable - Vulnerable code snippet - Remediation with secure code example - References to relevant security standards Code to audit: ``` [paste code here] ```
Recommended Models
Compatible Tools
claude-codecursorgithub-copilotkiroany
Modalities
Input: code, text
→Output: text, code
Related Skills
Author
OpenModels Community