Loading...
Loading...
Runs available security scanning tools against the current project and produces a consolidated markdown report. Auto-detects installed tools (gitleaks, semgrep, grype, npm audit, bandit, pip-audit, gosec, govulncheck, cargo audit, bundle-audit) and activates language-specific scanners based on project files. Gracefully skips missing tools and provides installation hints. By default scans the entire target directory. Pass --full to make the intent explicit (useful in workflows that combine full-codebase and diff-only scans). Use when running security scans, checking for vulnerabilities, detecting leaked secrets in git history, or validating security posture before commits or releases. Pairs with security-review for a complete security workflow.
npx skill4agent add nayuta/agent-skills security-scan| Mode | Flag | Behavior |
|---|---|---|
| Full scan (default) | (none) | Scans the entire target directory |
| Full scan (explicit) | | Same as default; use to make intent explicit in scripts or CI |
| Strict mode | | Exit with non-zero code when findings are detected (for CI gates) |
--fullsecurity-review--strict--strict# Default: scan full codebase
bash skills/security-scan/scripts/run-scans.sh [target-directory]
# Explicit full scan (identical result, intent is documented in output)
bash skills/security-scan/scripts/run-scans.sh --full [target-directory]
# Strict mode: exit non-zero if findings detected (for CI gates)
bash skills/security-scan/scripts/run-scans.sh --strict [target-directory]bash ~/.claude/skills/security-scan/scripts/run-scans.sh [--full] [--strict] [target-directory]## Tool:| Pattern | Likely False Positive When |
|---|---|
| Secret detected | Value matches |
| Dependency vuln | Only affects dev/test dependencies |
| Insecure function | Input is validated upstream |
| Weak crypto | Used for non-security purpose (e.g., cache key) |
## Security Scan Summary
**Date**: <ISO 8601>
**Directory**: <path>
**Mode**: full | full (--full)
**Tools run**: N | **Tools skipped**: N | **Tools with findings**: N
### Confirmed Findings
| Severity | Tool | Description | File / Location |
| -------- | --------- | ------------------------------------ | --------------- |
| Critical | gitleaks | AWS key exposed in git history | commit abc123 |
| High | npm audit | lodash < 4.17.21 prototype pollution | package.json |
### Likely False Positives
| Tool | Description | Reason dismissed |
| ------- | ------------ | ----------------------------- |
| semgrep | eval() usage | Only in sandboxed test runner |
### Install Missing Tools
<list tools skipped with install commands>| Tool | Purpose | Install |
|---|---|---|
| Secret detection in git history and working tree | |
| Static analysis with OWASP and security rule packs | |
| Filesystem vulnerability scanning | |
| Marker File | Tool | Purpose | Install |
|---|---|---|---|
| | JS/TS dependency vulnerabilities | bundled with Node.js |
| | Python insecure code patterns | |
| | Python dependency audit | |
| | Go insecure code patterns | |
| | Go module vulnerability database | |
| | Rust dependency audit | |
| | Ruby gem vulnerability audit | |
# Secrets
gitleaks detect --no-banner -v
# Static analysis
semgrep scan --config=auto --quiet
# Filesystem vulnerability scanning
grype dir:.
# Node.js
npm audit --omit=dev
# Python
bandit -r . -q --severity-level medium
pip-audit
# Go
gosec -quiet ./...
govulncheck ./...
# Rust
cargo audit
# Ruby
bundle-audit check --update--full--strict--strict| File | Purpose |
|---|---|
| Scanner runner with auto-detection and markdown output |