Skip to content

Shadows Security Scanner

Verified

7-phase security audit pipeline — reconnaissance, dependency scan, application tests, API security, hardening check, OWASP verification, report. Use before p...

87 downloads
$ Add to .claude/skills/

About This Skill

# Security Scanner — 7-Phase Audit Pipeline

Version: 1.1.0 | Author: Shadows Company | License: MIT

---

WHEN TO TRIGGER

  • Before any production deployment
  • After a security incident
  • Regular scheduled audit (monthly recommended)
  • New dependency or library added
  • User says "security audit", "check for vulnerabilities", "scan security"
  • Code review for security-sensitive features (auth, payments, data handling)

WHEN NOT TO TRIGGER

  • Simple UI changes with no data handling
  • Documentation-only changes

---

PREREQUISITES

  • Required:
  • `git` — Used in Phase 6 to scan git history for leaked secrets via `git log --all -p`. Detection: `which git` or `git --version`.
  • Optional (auto-detected for dependency scanning in Phase 2):
  • `npm` — Node.js package manager. Runs `npm audit --json` for JavaScript/TypeScript projects. Detected via `which npm` and presence of `package.json`.
  • `pip` / `pip3` — Python package manager. Runs `pip audit` for Python projects. Detected via `which pip` or `which pip3` and presence of `requirements.txt` or `pyproject.toml`.
  • `cargo` — Rust package manager. Runs `cargo audit` for Rust projects. Detected via `which cargo` and presence of `Cargo.toml`.
  • `curl` — Used optionally in Phase 5 for HTTP security header checks. Only invoked when the user provides a target URL. Detected via `which curl`.

If no package manager is detected, Phase 2 is skipped with a note in the report.

---

PROTOCOL — 7 PHASES

Phase 1 — RECONNAISSANCE

  1. Map the attack surface:
  2. List all entry points (routes, APIs, webhooks, forms)
  3. Identify data flows (user input -> storage -> output)
  4. Map authentication and authorization boundaries
  5. Identify external service integrations
  6. Check for exposed ports and services

```bash # Node.js — find all route definitions grep -rn "app\.\(get\|post\|put\|delete\|patch\)" --include="*.js" --include="*.ts" -l

# Python — find all route definitions grep -rn "@app\.\(route\|get\|post\)" --include="*.py" -l ```

Phase 2 — DEPENDENCY SCAN

Check for known vulnerabilities in dependencies:

```bash # Node.js — requires npm npm audit --json 2>/dev/null || echo "npm audit not available — install npm or skip Phase 2"

# Python — requires pip-audit (pip install pip-audit) pip audit 2>/dev/null || echo "pip audit not available — install pip-audit or skip Phase 2"

# Rust — requires cargo-audit (cargo install cargo-audit) cargo audit 2>/dev/null || echo "cargo-audit not available — install cargo-audit or skip Phase 2" ```

  • For each vulnerability found:
  • Severity (Critical/High/Medium/Low)
  • CVE identifier
  • Affected package and version
  • Available fix version
  • Is it exploitable in this context?

> NOTE: `npm audit` and `pip audit` make network calls to vulnerability databases (registry.npmjs.org, pypi.org/pyup.io). These are read-only queries.

Phase 3 — APPLICATION SECURITY TESTS

Check OWASP Top 10:

  1. Injection (SQL, NoSQL, OS, LDAP)
  2. - Search for string concatenation in queries
  3. - Verify parameterized queries are used
  4. ```bash
  5. grep -rn "f['\"].*SELECT\|f['\"].*INSERT\|f['\"].*UPDATE" --include="*.py"
  6. grep -rn "query.*\+\|exec.*\+" --include="*.js" --include="*.ts"
  7. ```
  1. Broken Authentication
  2. - Check session management: `grep -rn "session\|cookie\|jwt\|token" --include="*.py" --include="*.js" --include="*.ts" | grep -i "expir\|ttl\|maxage"`
  3. - Verify MFA implementation if applicable
  1. Sensitive Data Exposure
  2. - Search for hardcoded secrets:
  3. ```bash
  4. grep -rniE "(password|secret|api_key|token|private_key)\s*[:=]\s*['\"][^'\"]{8,}" --include="*.py" --include="*.js" --include="*.ts" --include="*.env"
  5. ```
  6. - Check HTTPS enforcement, HSTS headers
  1. XSS — Search for unsanitized user input in HTML output:
  2. ```bash
  3. grep -rn "innerHTML\|dangerouslySetInnerHTML\|v-html\|\|safe" --include="*.js" --include="*.ts" --include="*.jsx" --include="*.tsx" --include="*.html" --include="*.py"
  4. ```
  5. CSRF — Verify anti-CSRF tokens on state-changing endpoints
  6. Insecure Deserialization — Search for dangerous deserialization:
  7. ```bash
  8. grep -rn "eval(\|pickle\.loads\|yaml\.load(" --include="*.py" --include="*.js" --include="*.ts"
  9. ```

Phase 4 — API SECURITY

  1. For each API endpoint:
  2. Authentication required? (JWT, API key, session)
  3. Authorization enforced? (role checks, ownership validation)
  4. Rate limiting configured?
  5. Input validation present? (schema validation, type checking)
  6. Response doesn't leak internal details? (stack traces, DB structure)
  7. CORS properly configured?

Phase 5 — HARDENING CHECK

Verify infrastructure hardening.

HTTP Security Headers (only when user provides a target URL):

```bash # Replace $TARGET_URL with the URL provided by the user curl -sI "$TARGET_URL" | grep -iE "(strict-transport|content-security|x-frame|x-content-type)" ```

> IMPORTANT: Only run this check when user provides a target URL. Never make network requests to URLs not explicitly provided by the user.

  • Checklist:
  • [ ] `Strict-Transport-Security` header present
  • [ ] `Content-Security-Policy` header present
  • [ ] `X-Frame-Options` header present
  • [ ] `X-Content-Type-Options: nosniff` header present
  • [ ] No server version exposed in response headers
  • [ ] Debug mode disabled in production config
  • [ ] Error pages don't leak stack traces (inspect error handlers in code)
  • [ ] File upload restrictions enforced (check upload handlers for size/type validation)

Phase 6 — SECRETS VERIFICATION

```bash # Check git history for leaked secrets (local operation, no network) git log --all -p | grep -iE "(api[_-]?key|secret|token|password)\s*[:=]\s*['\"]" | head -20

# Verify .gitignore covers sensitive files cat .gitignore | grep -E "(\.env|secret|credential|\.pem|\.key)" ```

  • Verify:
  • [ ] `.env` files listed in `.gitignore`
  • [ ] No secrets found in git history
  • [ ] Secrets stored in environment variables or vault
  • [ ] No secrets printed in logs or error messages

Phase 7 — REPORT

Generate a structured security report using the OUTPUT FORMAT below.

---

LIMITATIONS

Grep-based scanning (Phases 3 and 6) uses pattern matching to detect common vulnerability signatures. This approach has inherent limitations:

  • False positives:
  • Comments or documentation containing patterns like `password = "example"` will be flagged
  • Test fixtures with dummy secrets (e.g., `api_key = "test_key_123"`) will trigger alerts
  • String comparisons against constant values (e.g., `if method == "SELECT"`) may be flagged as injection
  • False negatives:
  • Obfuscated secrets (base64-encoded, split across variables) will not be detected
  • Indirect injection via variable references (e.g., `query = build_query(user_input)`) is not caught
  • Secrets committed then deleted from history require `--all` flag and full history scan
  • Framework-specific vulnerability patterns not covered by generic regexes
  • Recommendation: Complement grep-based scans with dedicated tools:
  • SAST: Semgrep, CodeQL, or Bandit (Python)
  • Secrets: gitleaks, trufflehog, or detect-secrets
  • DAST: OWASP ZAP, Burp Suite, or Nuclei
  • SCA: Snyk, Dependabot, or Trivy

---

RULES

  1. Never skip phases — even if project seems simple
  2. Evidence-based — every finding must have file:line or command output
  3. Severity accuracy — don't inflate or downplay risks
  4. Actionable remediation — every finding must include HOW to fix
  5. No false security — passing this scan doesn't mean 100% secure

---

SECURITY CONSIDERATIONS

  • Commands executed: `grep` (local pattern matching), `git log` (local history scan), `npm audit` / `pip audit` / `cargo audit` (dependency vulnerability check), `curl` (HTTP HEAD request — Phase 5 only).
  • Network access: Phase 2 dependency scanners (`npm audit`, `pip audit`) make read-only queries to vulnerability databases. Phase 5 makes ONE outbound HTTP HEAD request via `curl` to check security headers — only when the user provides a target URL. All other phases are local-only.
  • Data read: Source files, dependency manifests, git history — all within the local repository.
  • File modification: None. This skill is read-only.
  • Persistence: None.
  • Credentials: None required by the skill itself. Scanned output may display secret-like patterns found in the repository — run in a secure terminal.
  • Sandboxing: Not required (no code execution). Standard terminal security applies when displaying scan results.

---

OUTPUT FORMAT

```markdown # Security Audit Report Date: [YYYY-MM-DD] Scope: [project/module name] Auditor: [agent name]

Executive Summary - Critical: [count] | High: [count] | Medium: [count] | Low: [count] - Overall Risk: [Critical/High/Medium/Low]

Findings

[CRITICAL/HIGH] Finding Title - **Category**: [OWASP category] - **Location**: [file:line] - **Description**: [what's wrong] - **Impact**: [what could happen] - **Remediation**: [how to fix] - **Status**: [Open/Fixed]

Dependency Vulnerabilities | Package | Severity | CVE | Fix Version | |---------|----------|-----|-------------| | ... | ... | ... | ... |

Hardening Status | Check | Status | |-------|--------| | HSTS | [PASS/FAIL] | | CSP | [PASS/FAIL] | | ... | ... |

Recommendations (Priority Order) 1. [Most critical action] 2. [Second priority] 3. [Third priority] ```

---

Published by Shadows Company — "We work in the shadows to serve the Light."

Use Cases

  • Scan code for security vulnerabilities including SQL injection, XSS, and hardcoded secrets
  • Perform structured security audits with severity-based findings reports
  • Audit network security configurations for dangerous exposure patterns
  • Review source code for insecure patterns and suggest remediation
  • Generate security audit reports organized by severity level for team review

Pros & Cons

Pros

  • +Security verified with no dangerous patterns detected in content analysis
  • +API-based architecture allows flexible integration with various platforms
  • +Structured security analysis helps prioritize remediation efforts
  • +Systematic approach ensures consistent coverage of common vulnerability patterns

Cons

  • -Requires API key configuration — not free or self-contained
  • -Static analysis only — does not replace runtime security testing or penetration testing
  • -May produce false positives that require manual verification

FAQ

What does Shadows Security Scanner do?
7-phase security audit pipeline — reconnaissance, dependency scan, application tests, API security, hardening check, OWASP verification, report. Use before p...
What platforms support Shadows Security Scanner?
Shadows Security Scanner is available on Claude Code, OpenClaw.
What are the use cases for Shadows Security Scanner?
Scan code for security vulnerabilities including SQL injection, XSS, and hardcoded secrets. Perform structured security audits with severity-based findings reports. Audit network security configurations for dangerous exposure patterns.

100+ free AI tools

Writing, PDF, image, and developer tools — all in your browser.

Next Step

Use the skill detail page to evaluate fit and install steps. For a direct browser workflow, move into a focused tool route instead of staying in broader support surfaces.