Skip to content

warathepj/cyber-security-skills

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

OWASP Security Audit Skill

OWASP Top 10 Version

A systematic, severity-rated framework for auditing web application security. This skill provides an agentic approach to identifying, classifying, and remediating vulnerabilities based on the OWASP Top 10 (2023).

🚀 Quick Start

To begin a security audit, use the following prompt:

Perform a security audit of this application using the owasp-audit skill

🛠️ Core Capabilities

This skill enables the agent to perform multi-dimensional security analysis:

  1. Automated Dependency Scanning: Checks for known vulnerabilities in third-party libraries using npm audit or equivalent.
  2. Secret Detection: Scans the codebase for hardcoded API keys, passwords, and sensitive configurations.
  3. Static Analysis (SAST): Uses high-confidence regex patterns to find injection flaws, broken access control, and insecure configurations.
  4. Security Header Verification: Inspects HTTP response headers for missing security protections (CSP, HSTS, etc.).
  5. Evidence-Based Reporting: Generates a professional PDF/Markdown report with CVSS 3.1 scoring and concrete fix examples.

📖 Methodology & Resources

1. The Audit Process

Follow the 4-step process defined in our Methodology Guide:

  • Step 1: Scoping & Discovery — Identify the tech stack and attack surface.
  • Step 2: Automated Verification — Run scripts to catch "low-hanging fruit".
  • Step 3: Targeted Code Review — Manual inspection of high-risk components (Auth, DB, IO).
  • Step 4: Reporting & Prioritization — Classify findings by severity and impact.

2. Vulnerability Classification

We use a structured Severity Framework to ensure consistent reporting:

  • 🔴 Critical: Urgent fix required; direct path to RCE or massive data breach.
  • 🟠 High: Significant impact; broken authentication or PII exposure.
  • 🟡 Medium: Harder to exploit or limited impact; IDOR, missing headers.
  • 🔵 Low: Best practice violations; information disclosure.
  • ⚪ Info: Hardening recommendations.

🔍 Technical Assets

Component Description
Audit Checklist Deep Dive: 30+ point verification list for manual and automated checks.
Vulnerability Patterns Code Reference: Regex and examples of vulnerable code for Auth, DB, and Server.
Remediation Examples Fix Library: Side-by-side "Vulnerable vs. Secure" code comparisons.
OWASP Reference Knowledge Base: Detailed breakdowns of the 2023 risk categories.

⚡ Automation Scripts

Warning

While automation is powerful, Manual Verification is critical to eliminate False Positives, particularly for complex logical issues like Broken Access Control.


📊 Sample Reports

Explore these examples to see the quality of output generated by this skill:


📝 Usage for Developers

You can target specific audit areas during development:

  • "Audit the authentication logic for session management vulnerabilities."
  • "Run a secret scan and check my security headers."
  • "Explain Category A01:2021-Broken Access Control and check my codebase for it."

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors