Back to Marketplace
30-day free campaign

Run this helper free — no credit card

Every helper is free for 30 days. Answer 3 questions and get the full result in 2 minutes.

Start free →
FREE
Scanned
Grow Business

Security Scanner Skill

Defensive repository security scanner for secrets, risky dependencies, vulnerable code patterns, and insecure configuration with redacted evidence and actionable fixes.

Install in one line

mfkvault install security-scanner-skill

Requires the MFKVault CLI. Prefer MCP?

New skill
No reviews yet
New skill
💻 Codex
This helper was discovered by MFKVault crawlers from public sources. Original author retains all rights. To request removal: [email protected]
Community helper
This helper was discovered by MFKVault crawlers from public sources. MFKVault does not create, maintain, or guarantee the output of this helper. Results are AI-generated and may be incomplete, inaccurate, or outdated. Use at your own risk. Original author retains all rights. Request removal
FREE

Free to install — no account needed

Copy the command below and paste into your agent.

Instant access • No coding needed • No account needed

What you get in 5 minutes

  • Full skill code ready to install
  • Works with 1 AI agent
  • Lifetime updates included
SecureBe the first
Ready to run

Run this helper

Answer a few questions and let this helper do the work.

Advanced: use with your AI agent

Description

# Security Scanner Skill Use this skill when the user asks to scan a code repository, package, diff, dependency list, CI output, or configuration bundle for security risks. It is designed for defensive review only and must not be used to exploit, weaponize, or bypass systems. ## What To Scan Prioritize these risk classes: - Exposed secrets: API keys, tokens, private keys, passwords, webhook secrets, cloud credentials, database URLs, JWT signing keys, and seed phrases. - Vulnerable dependencies: known-CVE packages, abandoned packages, suspicious typosquats, risky postinstall scripts, and outdated security-critical libraries. - Risky code patterns: command injection, SQL injection, path traversal, unsafe deserialization, SSRF, XSS sinks, weak crypto, insecure random generation, hardcoded admin bypasses, excessive permissions, and missing auth checks. - Configuration issues: public storage buckets, permissive CORS, debug flags in production, plaintext secrets in CI, overly broad IAM policies, missing security headers, and unpinned container images. ## Workflow 1. Establish scope. Identify the files, package managers, language, framework, deployment surface, and whether the user provided a diff or full repo. 2. Refuse unsafe requests. Do not help exploit targets, steal credentials, bypass auth, persist malware, or hide activity. Offer a defensive review instead. 3. Inventory likely sensitive files. Check env examples, CI files, package manifests, lockfiles, Dockerfiles, infrastructure manifests, auth middleware, API routes, database access, and upload/download handlers. 4. Search for secrets with conservative patterns. Treat matches as sensitive; do not print full secret values. Show only prefixes/suffixes when necessary, for example sk_live_...abcd. 5. Review dependencies. Use available local tools such as npm audit, pnpm audit, pip-audit, osv-scanner, cargo audit, or language-native lockfile inspection when present. If tools are unavailable, explain the limitation and inspect manifests manually. 6. Review code paths. Trace user-controlled input to file system, shell, database, HTTP client, template rendering, auth decisions, and serialization boundaries. 7. Rate severity. Use Critical, High, Medium, Low, or Info. Tie severity to exploitability, impact, exposure, and compensating controls. 8. Provide fixes. For every Critical, High, and Medium finding, include a minimal remediation and a verification step. ## Output Format Return a concise report: ### Summary - Overall risk: Critical | High | Medium | Low - Scope reviewed - Tools used or unavailable - Highest-priority fix ### Findings For each finding: - Severity - Title - Evidence location - Why it matters - Recommended fix - Verification step ### Secret Handling Never reveal complete secrets. If a secret is found, redact it and recommend immediate rotation plus history cleanup if committed. ### Residual Risk List unreviewed areas, missing context, skipped tools, or files excluded by scope. ## Quality Bar Be specific and actionable. Avoid vague warnings like "sanitize input" without naming the vulnerable input, sink, and exact fix. Prefer small patches and verification commands when the user has granted code-edit permission.

Preview in:

Security Status

Scanned

Passed automated security checks

Time saved
How much time did this skill save you?

Related AI Tools

More Grow Business tools you might like

codex-collab

Free

Use when the user asks to invoke, delegate to, or collaborate with Codex on any task. Also use PROACTIVELY when an independent, non-Claude perspective from Codex would add value — second opinions on code, plans, architecture, or design decisions.

Run free

Move Code Quality Checker

Free

Analyzes Move language packages against the official Move Book Code Quality Checklist. Use this skill when reviewing Move code, checking Move 2024 Edition compliance, or analyzing Move packages for best practices. Activates automatically when working

Run free

Claude Memory Kit

Free

"Persistent memory system for Claude Code. Your agent remembers everything across sessions and projects. Two-layer architecture: hot cache (MEMORY.md) + knowledge wiki. Safety hooks prevent context loss. /close-day captures your day in one command. Z

Run free

Feature Marker - End-to-End Feature Development Orchestrator

Free

Automates complete feature development from requirements to pull request with PRD generation, tech specs, task breakdown, implementation, testing, and PR creation

Run free

Obsidian Theme Designer

Free

Use when the user wants to design, preview, or customize an Obsidian vault theme — including choosing styles, comparing color schemes, adjusting typography, or generating CSS snippets. Triggers on keywords like "Obsidian theme", "color scheme", "CSS

Run free

Brand Guidelines Engine

Free

Universal brand guideline engine for producing, reviewing, and suggesting brand-compliant marketing materials for any company

Run free