← Back to Skills
🛡️

Security Audit Scan

Scan for CVEs, OWASP risks, hardcoded secrets, and security misconfigurations

Operations 5 steps 5 tools 3 servers

Example Prompt

Run a security audit on our project — check dependencies for CVEs, scan for hardcoded secrets, and report any OWASP risks

About

Performs a comprehensive security audit by scanning project dependencies for known CVEs, reading source files for OWASP Top 10 vulnerability patterns and hardcoded secrets, then reasoning through findings to assess exploitability and severity. Produces a prioritized report with remediation guidance for each finding.

Workflow Steps

1

List project directories to identify dependency manifests, config files, and source code

📁 List Directory
2

Read dependency files and source code to detect vulnerable packages, hardcoded secrets, and insecure patterns

📄 Read File
3

Cross-reference findings against CVE databases and OWASP advisory resources

🌐 Web Search
4

Assess each finding's severity and exploitability, then prioritize remediations

🧠 Structured Reasoning
5

Write a structured security audit report with severity ratings and remediation steps

✏️ Write File

Tags

securitycveowaspsecretsauditvulnerabilities