Agent Skills: Security Audit

Deep security audit covering OWASP Top 10, authentication, authorization, data protection, dependency vulnerabilities, and secrets scanning. Delegates to the Centinela (QA) agent.

UncategorizedID: davepoon/buildwithclaude/security-audit

Install this agent skill to your local

pnpm dlx add-skill https://github.com/davepoon/buildwithclaude/tree/HEAD/plugins/agent-triforce/skills/security-audit

Skill Files

Browse the full folder contents for security-audit.

Download Skill

Loading file tree…

plugins/agent-triforce/skills/security-audit/SKILL.md

Skill Metadata

Name
security-audit
Description
Deep security audit covering OWASP Top 10, authentication, authorization, data protection, dependency vulnerabilities, and secrets scanning. Delegates to the Centinela (QA) agent.

Security Audit

Performs a deep security audit using the Centinela (QA) agent.

When to Use This Skill

  • Before a release to verify security posture
  • After significant code changes that touch authentication, authorization, or data handling
  • Periodic security review of the codebase
  • When adding new dependencies or external integrations

What This Skill Does

  1. Runs the SIGN IN checklist
  2. Performs OWASP Top 10 systematic check (A01-A10)
  3. Scans for hardcoded secrets, API keys, tokens, and connection strings
  4. Audits dependencies for known CVEs
  5. Checks smart contracts if Solidity is present (reentrancy, overflow, access control)
  6. Runs Security Verification and Quality Verification checklists (TIME OUT)
  7. Issues verdict and writes report to docs/reviews/security-audit-{date}.md
  8. Prepares findings handoff to Dev agent

How to Use

Basic Usage

/security-audit

Scoped Audit

/security-audit src/auth/ src/api/

Example

User: /security-audit src/payments/

Output: A security audit report at docs/reviews/security-audit-2026-02-23.md with:

  • OWASP Top 10 findings organized by severity
  • Secrets scan results
  • Dependency vulnerability report
  • Verdict: APPROVED or CHANGES REQUIRED
  • Fix order recommendation for the Dev agent

Tips

  • If no scope is specified, the entire src/ directory is audited
  • Critical findings trigger the Non-Normal emergency checklist
  • The agent will never attempt to fix vulnerabilities — only document them