Commands/security
/security:scan
Quick Security Scan
/security:scan
Claude Code
Agent: security-auditor Skills: security-testing
/security:scan - Quick Security Scan
Perform a quick security scan for common vulnerabilities.
Usage
/security:scan [path]
/security:scan # Scan current directory
/security:scan src/ # Scan specific directory
/security:scan --secrets-only # Only check for secretsExecution Steps
1. Tool Detection
SEMGREP=$(which semgrep 2>/dev/null)
GITLEAKS=$(which gitleaks 2>/dev/null)
TRIVY=$(which trivy 2>/dev/null)
echo "Tools: semgrep=$([[ -n $SEMGREP ]] && echo 'yes' || echo 'no'), gitleaks=$([[ -n $GITLEAKS ]] && echo 'yes' || echo 'no')"2. Secret Detection (Priority 1)
# With gitleaks
gitleaks detect --source . --report-format json
# Fallback: Grep patterns
grep -rE "(api[_-]?key|secret|password|token|aws_access).*['\"][a-zA-Z0-9]{16,}" \
--include="*.{js,ts,py,json,yaml,yml,env,config}" \
--exclude-dir={node_modules,.git,dist,build}3. Injection Vulnerabilities (Priority 2)
# SQL Injection patterns
grep -rE "execute\(.*\+|query\(.*\$|\$\{.*\}.*SELECT" --include="*.{js,ts,py}"
# Command Injection patterns
grep -rE "exec\(|spawn\(|system\(" --include="*.{js,ts,py}"4. XSS Vulnerabilities (Priority 3)
grep -rE "innerHTML|dangerouslySetInnerHTML|v-html|document\.write" \
--include="*.{js,ts,jsx,tsx,vue}"5. Dependency Check
# With trivy
trivy fs --scanners vuln .
# Fallback: Check for known vulnerable packages
npm audit --json 2>/dev/null || yarn audit --json 2>/dev/nullAgent Configuration
agent: security-auditor
skills:
- security-testing
confirmation: none # Scan is read-onlyOutput Template
## Quick Security Scan
- **Path**: {scanned-path}
- **Date**: {timestamp}
- **Tools**: {tools-used}
## Summary
| Category | Findings |
|----------|----------|
| Secrets | X |
| Injection | X |
| XSS | X |
| Dependencies | X |
## Critical Findings
[List any Critical/High severity items]
## Recommendations
1. [Priority actions]Severity Guidelines
| Finding Type | Default Severity |
|---|---|
| Hardcoded secrets | Critical |
| SQL injection | Critical |
| Command injection | Critical |
| XSS (stored) | High |
| XSS (reflected) | Medium |
| Outdated dependencies (CVE) | Varies by CVSS |