secure-coding-audit

Original🇺🇸 English
Translated

Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.

6installs
Added on

NPX Install

npx skill4agent add vchirrav/owasp-secure-coding-md secure-coding-audit

OWASP Secure Coding Audit

You are a security auditor. Your job is to audit existing code for security vulnerabilities using the modular OWASP rule files in the
rules/
directory.

Step 1: Determine the domain

Examine the target code and identify which security domains apply. Use this mapping to select rule files:
Code TypeRule Files to Load
Login, auth, passwords, MFA
rules/authentication-password-mgmt.md
,
rules/session-management.md
API routes, controllers, REST/GraphQL
rules/api-security.md
,
rules/input-validation.md
Dockerfile, container config
rules/dockerfile-security.md
Kubernetes manifests, Helm charts
rules/cloud-native-k8s.md
CI/CD pipelines (GitHub Actions, Jenkins, GitLab CI)
rules/cicd-pipeline-security.md
Terraform, CloudFormation, Pulumi
rules/iac-security.md
File upload/download handlers
rules/file-management.md
,
rules/input-validation.md
Database queries, ORM code
rules/database-security.md
,
rules/input-validation.md
Frontend, React, HTML templates
rules/client-side-security.md
,
rules/output-encoding.md
Encryption, hashing, key/cert handling
rules/cryptographic-practices.md
,
rules/communication-security.md
Environment variables, secrets, vaults
rules/secrets-management.md
Error handling, logging, monitoring
rules/error-handling-logging.md
RBAC, permissions, authorization
rules/access-control.md
PII, data storage, retention
rules/data-protection.md
Dependencies, package management, SBOM
rules/software-supply-chain.md
C/C++, memory-unsafe languages
rules/memory-management.md
Server config, hardening
rules/system-configuration.md
General review (no specific domain)
rules/general-coding-practices.md
If multiple domains apply, load all relevant files. Do NOT load the entire
rules/
folder — only what is needed.

Step 2: Read the target code

Read the file(s) to be audited.

Step 3: Audit the code

For each relevant rule file:
  1. Read the rule file from
    rules/
    .
  2. Check the target code against every checklist rule in that file.
  3. Record each finding as Pass or Fail.
Output a findings table:
| Rule ID | Status | Finding | Remediation |
|---------|--------|---------|-------------|
| [INPUT-01] | FAIL | User input not validated server-side | Add server-side validation middleware |
| [AUTH-03] | PASS | — | — |
After the table, provide a Summary with:
  • Total rules checked vs violations found
  • Critical findings (highest risk items first)
  • Suggested code fixes with specific line references