security-audit

安装量: 45
排名: #16463

安装

npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill security-audit

Security Auditing Workflow Bundle Overview Comprehensive security auditing workflow for web applications, APIs, and infrastructure. This bundle orchestrates skills for penetration testing, vulnerability assessment, security scanning, and remediation. When to Use This Workflow Use this workflow when: Performing security audits on web applications Testing API security Conducting penetration tests Scanning for vulnerabilities Hardening application security Compliance security assessments Workflow Phases Phase 1: Reconnaissance Skills to Invoke scanning-tools - Security scanning shodan-reconnaissance - Shodan searches top-web-vulnerabilities - OWASP Top 10 Actions Identify target scope Gather intelligence Map attack surface Identify technologies Document findings Copy-Paste Prompts Use @scanning-tools to perform initial reconnaissance Use @shodan-reconnaissance to find exposed services Phase 2: Vulnerability Scanning Skills to Invoke vulnerability-scanner - Vulnerability analysis security-scanning-security-sast - Static analysis security-scanning-security-dependencies - Dependency scanning Actions Run automated scanners Perform static analysis Scan dependencies Identify misconfigurations Document vulnerabilities Copy-Paste Prompts Use @vulnerability-scanner to scan for OWASP Top 10 vulnerabilities Use @security-scanning-security-dependencies to audit dependencies Phase 3: Web Application Testing Skills to Invoke top-web-vulnerabilities - OWASP vulnerabilities sql-injection-testing - SQL injection xss-html-injection - XSS testing broken-authentication - Authentication testing idor-testing - IDOR testing file-path-traversal - Path traversal burp-suite-testing - Burp Suite testing Actions Test for injection flaws Test authentication mechanisms Test session management Test access controls Test input validation Test security headers Copy-Paste Prompts Use @sql-injection-testing to test for SQL injection vulnerabilities Use @xss-html-injection to test for cross-site scripting Use @broken-authentication to test authentication security Phase 4: API Security Testing Skills to Invoke api-fuzzing-bug-bounty - API fuzzing api-security-best-practices - API security Actions Enumerate API endpoints Test authentication/authorization Test rate limiting Test input validation Test error handling Document API vulnerabilities Copy-Paste Prompts Use @api-fuzzing-bug-bounty to fuzz API endpoints Phase 5: Penetration Testing Skills to Invoke pentest-commands - Penetration testing commands pentest-checklist - Pentest planning ethical-hacking-methodology - Ethical hacking metasploit-framework - Metasploit Actions Plan penetration test Execute attack scenarios Exploit vulnerabilities Document proof of concept Assess impact Copy-Paste Prompts Use @pentest-checklist to plan penetration test Use @pentest-commands to execute penetration testing Phase 6: Security Hardening Skills to Invoke security-scanning-security-hardening - Security hardening auth-implementation-patterns - Authentication api-security-best-practices - API security Actions Implement security controls Configure security headers Set up authentication Implement authorization Configure logging Apply patches Copy-Paste Prompts Use @security-scanning-security-hardening to harden application security Phase 7: Reporting Skills to Invoke reporting-standards - Security reporting Actions Document findings Assess risk levels Provide remediation steps Create executive summary Generate technical report Security Testing Checklist OWASP Top 10 Injection (SQL, NoSQL, OS, LDAP) Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Security Misconfiguration Cross-Site Scripting (XSS) Insecure Deserialization Using Components with Known Vulnerabilities Insufficient Logging & Monitoring API Security Authentication mechanisms Authorization checks Rate limiting Input validation Error handling Security headers Quality Gates All planned tests executed Vulnerabilities documented Proof of concepts captured Risk assessments completed Remediation steps provided Report generated Related Workflow Bundles development - Secure development practices wordpress - WordPress security cloud-devops - Cloud security testing-qa - Security testing

返回排行榜