Skip to content

sari3l/security-code-audit-skill

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

security-code-audit

Current release: v1.0.6

Code security audit skill for web/API, backend, full-stack, smart-contract, and artifact-centric repositories.

security-code-audit is designed for code security review, SAST-style analysis, OWASP-style checks, dependency auditing, smart-contract review, artifact and prompt-surface review, and remediation retest. It focuses on real code, exploitability, bounded tracing, persistent audit state, and high-signal reporting instead of shallow pattern matching.

Chinese documentation: README-CN.md

1. Usage

  • /security-code-audit Default full audit. Equivalent to standard single.
  • /security-code-audit quick Fast high-risk triage.
  • /security-code-audit deep Exhaustive review with stronger verification and attack-chain depth.
  • /security-code-audit regression Retest the latest report and verify whether fixes actually hold.
  • /security-code-audit help Show parameters, modes, execution options, and examples.

Parameters:

  • depth: quick | standard | deep | regression
  • execution: single | multi
  • multi is beta and falls back to single if the host cannot delegate

Examples:

  • /security-code-audit deep multi
  • /security-code-audit regression
  • /security-code-audit deep --agents=multi

2. Core Capabilities

  • Target-aware routing Recon selects a target profile first, then routes into the right knowledge domain and shared modules for the observed surface.
  • Real-code focus Findings are expected to be tied to actual file locations, exploit paths, and concrete minimal fixes.
  • Bounded tracing Bidirectional tracing keeps source-to-sink and state-transition analysis focused on real trust-boundary crossings instead of unbounded graph expansion.
  • Repeated-pattern enumeration The skill is built to find all materially affected locations, not just the first hit.
  • Audit-state continuity .security-code-audit-state/ stores compact run context, loaded-module decisions, function-chain records, and invalidations so every run can re-orient cleanly.
  • Dependency and artifact coverage Application code, dependencies, markdown and prompt artifacts, API specs, notebooks, config, and IaC surfaces all fit into the same audit flow.
  • Honest coverage reporting Partial, blocked, or invalidated review areas are carried forward as coverage debt instead of being reported as fully covered.
  • Evidence-gated findings Main findings stay limited to confirmed issues, while unresolved high-signal cases remain visible as candidate signals or working hypotheses instead of being silently dropped.
  • History and regression support Findings are compared against .security-code-audit-reports/, and regression mode can retest the latest report directly after a fresh current-state pass or report-baseline selection.
  • Optional multi-agent execution multi can widen coverage for large repos while keeping a single reporting path.

3. Architecture

Runtime architecture: staged scanning with profile routing, lazy loading, bounded tracing, and persistent state.

flowchart TD
    A["User command<br/>/security-code-audit [mode] [execution]"]
    B["SKILL.md<br/>entry router + shared workflow"]

    C["Bootstrap control plane<br/>parse mode + execution<br/>load core controls and mode rules"]
    D["Recon phase<br/>map repo surface, stack, artifacts, and risk areas"]
    E["Profile selection<br/>application | smart-contract | artifact-centric"]

    F["core/loading.md<br/>lazy loading + on-demand routing"]
    G["Primary knowledge domain<br/>application or smart-contract"]
    H["Shared modules<br/>artifacts, dependencies, reporting, and state standards"]
    T["Core quality controls<br/>integrity, coverage, severity,<br/>and bidirectional tracing"]

    I["Targeted audit pass<br/>follow selected references for the active surface"]
    J["Evidence and consolidation<br/>validate findings, dedupe repeats, track coverage debt"]
    K["Reporting and regression<br/>write findings, compare history, retest fixes"]

    S[".security-code-audit-state/<br/>run context, function chains,<br/>loading decisions, hypotheses, invalidations"]
    R[".security-code-audit-reports/<br/>human-readable findings and history"]

    A --> B
    B --> C
    C --> D
    D --> E
    E --> F

    F --> G
    F --> H
    F --> T

    G --> I
    H --> I
    T --> I
    I --> J
    J --> K
    K --> R

    D -. initialize or refresh scan state .-> S
    F -. persist selected modules .-> S
    I -. update findings, traces, and coverage .-> S
    J -. carry forward hypotheses and invalidations .-> S
    S -. support quick baselines, long scans,<br/>regression, and multi-agent continuity .-> I
    R -. latest report reused by regression mode .-> K
Loading

The skill is intentionally split into layers:

Path Purpose
SKILL.md Router, help path, shared workflow, and progress rules
core/ Integrity, coverage, findings, severity, lazy loading, and bidirectional tracing controls
profiles/ Post-recon target semantics: application, smart-contract, or artifact-centric
references/application/ Primary methodology for web/API/backend audits
references/smart-contract/ Primary methodology for Solidity and on-chain audits
references/shared/ Shared artifact, dependency, reporting, and audit-state standards
modes/ quick, standard, deep, and regression depth contracts

Output layers:

Path Purpose
.security-code-audit-reports/ Human-readable findings, history, regression baselines, and action items
.security-code-audit-state/ Machine-readable run context, surface inventories, function chains, hypotheses, and invalidations for every run

About

Security code audit skill for web/API, backend, and smart contract repositories with evidence-based findings, dependency checks, regression retesting, and optional multi-agent execution.

Topics

Resources

License

Stars

Watchers

Forks

Contributors