Skip to content
scsiwyg
sign insign up
get startedhow it worksmcpscsiblogcommunityapiplaygroundswaggersign insign up
Claude Skills Library·/security-audit16 Apr 2026David Olsson

/security-audit

#reference#pipeline#security

David OlssonDavid Olsson

/security-audit

Deep, multi-dimensional security audit with six parallel agents. Produces an overall posture score and remediation plan.

Trigger: "security audit", "security review", "vulnerability assessment", "OWASP audit", "is this secure", "auth audit", "security posture" Output: docs/04-security-audit/ Reports: 8 (00–07) · Self-contained (6 agents)

Reports

#FileWhat it covers
0000-executive-summary.mdOverall posture score, top findings, remediation priorities
0101-authentication.mdAuth flows, sessions, tokens, OAuth, password reset
0202-api-data.mdEndpoint security, input validation, data protection, injection
0303-infrastructure.mdHosting, deployment, network, headers, TLS, CI/CD
0404-protocol.mdMCP, GraphQL, WebSocket, RSS — protocol-specific vectors
0505-abuse-prevention.mdRate limiting, brute force, spam, enumeration, resource exhaustion
0606-owasp-best-practices.mdOWASP Top 10 compliance, pass/fail per category
0707-privacy-compliance.mdGDPR/privacy (optional, generated if PII handling detected)

Output Tree

docs/04-security-audit/
├── 00-executive-summary.md
├── 01-authentication.md
├── 02-api-data.md
├── 03-infrastructure.md
├── 04-protocol.md
├── 05-abuse-prevention.md
├── 06-owasp-best-practices.md
└── 07-privacy-compliance.md        # optional

Workflow

  1. Reconnaissance: scan codebase, identify auth model, API surface, infrastructure, protocols in use
  2. Six agents launch in parallel, each examining one attack surface
  3. Executive summary synthesizes all findings with posture score

Distinct from /code-audit

The /code-audit pipeline includes a security pillar (one of five auditors). This /security-audit is a dedicated, deep review with six agents focused exclusively on security. Run both if you want code health AND deep security.

Integration

  • Reads from: project-scanner output; existing doc-suite if available
  • Pairs with: /code-audit for complete health picture
  • Feeds into: /moat-audit references security posture

Use Cases


Download the full toolkit → · Back to library →

Share
𝕏 Post