Loading...
Loading...
This skill should be used when the user asks for "security status", "show findings", "security dashboard", "security posture", or invokes /appsec:status. Shows current security posture overview.
npx skill4agent add florianbuetow/claude-code status.appsec//appsec:run/appsec:full-audit| Flag | Behavior |
|---|---|
| ASCII dashboard (default). |
| Structured JSON summary. |
| Markdown summary. |
| Findings count only, no details. |
.appsec/| File | Content | Required |
|---|---|---|
| Consolidated findings from last run | Yes |
| Timestamp, scope, depth, tools used | Yes |
| Stack detection, scanner availability | Optional |
| User preferences (from | Optional |
.appsec/findings.json.appsec/last-run.json=====================================================
APPSEC STATUS -- No Data
=====================================================
No security scan data found. Run a scan first:
/appsec:start Assess project and get recommendations
/appsec:run Run smart security scan
/appsec:full-audit Exhaustive audit with report
=====================================================.appsec/findings.json.appsec/last-run.json.appsec/start-assessment.json.appsec/config.yamlgit diff --name-onlylast-run.json=====================================================
APPSEC STATUS -- Dashboard
=====================================================
LAST SCAN: <timestamp> (<relative time, e.g., "2 hours ago">)
SCOPE: <scope from last run>
DEPTH: <depth from last run>
FINDINGS:
+-------+----------+------+--------+-----+-------+
| | Critical | High | Medium | Low | Total |
+-------+----------+------+--------+-----+-------+
| Count | N | N | N | N | N |
+-------+----------+------+--------+-----+-------+
TOP PRIORITIES:
1. <ID> <severity> <title> (<file>:<line>)
2. <ID> <severity> <title> (<file>:<line>)
3. <ID> <severity> <title> (<file>:<line>)
4. <ID> <severity> <title> (<file>:<line>)
5. <ID> <severity> <title> (<file>:<line>)
CHANGES SINCE LAST SCAN:
Files modified: N
New files: N
Files with existing findings modified: N
Stale findings (file changed): N
SCANNER STATUS:
<scanner> installed <N findings>
<scanner> installed <N findings>
<scanner> missing (would cover: <categories>)
FRAMEWORKS RUN:
OWASP Top 10 <N findings>
STRIDE <N findings>
PASTA <N findings> (or "not run")
LINDDUN <N findings> (or "not run")
SANS/CWE 25 <N findings> (or "not run")
HOTSPOT FILES:
<file> <N findings> (<severities>)
<file> <N findings> (<severities>)
<file> <N findings> (<severities>)
=====================================================
/appsec:run Re-scan (detects changes)
/appsec:explain <ID> Explain a finding
/appsec:run --scope changed Scan only changed files
====================================================={
"last_scan": {
"timestamp": "2026-02-14T10:30:00Z",
"scope": "full",
"depth": "standard",
"tools_used": ["secrets", "injection", "access-control"]
},
"findings": {
"total": 12,
"by_severity": { "critical": 1, "high": 3, "medium": 5, "low": 3 },
"by_framework": { "owasp": 8, "stride": 3, "secrets": 1 },
"top_priorities": [
{ "id": "INJ-001", "severity": "critical", "title": "...", "file": "..." }
]
},
"changes_since_scan": {
"modified_files": 5,
"new_files": 2,
"files_with_findings_modified": 1,
"stale_findings": 3
},
"scanners": {
"semgrep": { "installed": true, "findings": 4 },
"gitleaks": { "installed": false }
}
}--scope changed