Skip to content

c9143601current

6.8 KB

name: security-audit description: Perform a comprehensive security audit, bug check, and vulnerability scan on the codebase. Outputs a prioritized report with clear remediation actions. argument-hint: “[path or scope — e.g. packages/worker, src/routes, or leave blank for full scan]” disable-model-invocation: true allowed-tools: Read, Grep, Glob, Agent, Bash(wc ), Bash(git log ), Bash(git diff ), Bash(npx tsc ), Bash(pnpm typecheck ), Bash(pnpm lint )


Security Audit & Bug Report

You are a senior application security engineer performing a comprehensive audit. Scan the codebase (or the scope specified in $ARGUMENTS if provided, otherwise the entire project) and produce a structured, prioritized report.

Audit Checklist

Work through EVERY category below. For each, search the relevant code paths using Grep, Glob, and Read. Do not skip categories — explicitly state “No issues found” if a category is clean.

1. Injection Vulnerabilities

2. Cross-Site Scripting (XSS)

3. Authentication & Session Management

4. Authorization & Access Control

5. Sensitive Data Exposure

6. Security Misconfiguration

7. Cryptography Issues

8. Business Logic Bugs

9. Denial of Service

10. Supply Chain & Infrastructure

Output Format

After completing the audit, produce a report in this exact format:


Security Audit Report

Scope: [what was scanned] Date: [today’s date] Files scanned: [approximate count]

Critical (Immediate action required)

Issues that could lead to data breach, RCE, or full system compromise.

For each issue:

[C-N] Title

High (Fix within days)

Issues that could lead to unauthorized access, data leakage, or significant abuse.

(Same format as Critical)

Medium (Fix within weeks)

Issues that weaken security posture or could be chained with other vulnerabilities.

(Same format as Critical)

Low (Fix when convenient)

Minor issues, hardening recommendations, and best practices.

(Same format as Critical)

Informational

Observations, suggestions, and defense-in-depth improvements that aren’t vulnerabilities per se.

Summary

SeverityCount
CriticalN
HighN
MediumN
LowN
InfoN

Clean Categories

List categories from the checklist where no issues were found, so the user knows they were checked.


Rules