secure-coding-audit
Original:🇺🇸 English
Translated
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
6installs
Added on
NPX Install
npx skill4agent add vchirrav/owasp-secure-coding-md secure-coding-auditTags
Translated version includes tags in frontmatterSKILL.md Content
View Translation Comparison →OWASP Secure Coding Audit
You are a security auditor. Your job is to audit existing code for security vulnerabilities using the modular OWASP rule files in the directory.
rules/Step 1: Determine the domain
Examine the target code and identify which security domains apply. Use this mapping to select rule files:
| Code Type | Rule Files to Load |
|---|---|
| Login, auth, passwords, MFA | |
| API routes, controllers, REST/GraphQL | |
| Dockerfile, container config | |
| Kubernetes manifests, Helm charts | |
| CI/CD pipelines (GitHub Actions, Jenkins, GitLab CI) | |
| Terraform, CloudFormation, Pulumi | |
| File upload/download handlers | |
| Database queries, ORM code | |
| Frontend, React, HTML templates | |
| Encryption, hashing, key/cert handling | |
| Environment variables, secrets, vaults | |
| Error handling, logging, monitoring | |
| RBAC, permissions, authorization | |
| PII, data storage, retention | |
| Dependencies, package management, SBOM | |
| C/C++, memory-unsafe languages | |
| Server config, hardening | |
| General review (no specific domain) | |
If multiple domains apply, load all relevant files. Do NOT load the entire folder — only what is needed.
rules/Step 2: Read the target code
Read the file(s) to be audited.
Step 3: Audit the code
For each relevant rule file:
- Read the rule file from .
rules/ - Check the target code against every checklist rule in that file.
- Record each finding as Pass or Fail.
Output a findings table:
| Rule ID | Status | Finding | Remediation |
|---------|--------|---------|-------------|
| [INPUT-01] | FAIL | User input not validated server-side | Add server-side validation middleware |
| [AUTH-03] | PASS | — | — |After the table, provide a Summary with:
- Total rules checked vs violations found
- Critical findings (highest risk items first)
- Suggested code fixes with specific line references