Scan for input validation vulnerabilities and injection risks. Use when reviewing user input handling. Trigger with 'scan input validation', 'check injection vulnerabilities', or 'validate sanitization'.
View on GitHubjeremylongshore/claude-code-plugins-plus-skills
input-validation-scanner
plugins/security/input-validation-scanner/skills/scanning-input-validation-practices/SKILL.md
January 22, 2026
Select agents to install to:
npx add-skill https://github.com/jeremylongshore/claude-code-plugins-plus-skills/blob/main/plugins/security/input-validation-scanner/skills/scanning-input-validation-practices/SKILL.md -a claude-code --skill scanning-input-validation-practicesInstallation paths:
.claude/skills/scanning-input-validation-practices/# Input Validation Scanner This skill provides automated assistance for input validation scanner tasks. ## Overview This skill automates the process of identifying potential input validation flaws within a codebase. By analyzing how user-provided data is handled, it helps developers proactively address security vulnerabilities before they can be exploited. This skill streamlines security audits and improves the overall security posture of applications. ## How It Works 1. **Initiate Scan**: The user requests an input validation scan, triggering the skill. 2. **Code Analysis**: The skill uses the input-validation-scanner plugin to analyze the specified codebase or file. 3. **Vulnerability Identification**: The plugin identifies instances where input validation may be missing or insufficient. 4. **Report Generation**: The skill presents a report highlighting potential vulnerabilities and their locations in the code. ## When to Use This Skill This skill activates when you need to: - Audit a codebase for input validation vulnerabilities. - Review newly written code for potential XSS or SQL injection flaws. - Harden an application against common web security exploits. - Ensure compliance with security best practices related to input handling. ## Examples ### Example 1: Identifying XSS Vulnerabilities User request: "Scan the user profile module for potential XSS vulnerabilities." The skill will: 1. Activate the input-validation-scanner plugin on the specified module. 2. Generate a report highlighting areas where user input is directly rendered without proper sanitization, indicating potential XSS vulnerabilities. ### Example 2: Checking for SQL Injection Risks User request: "Check the database access layer for potential SQL injection risks." The skill will: 1. Use the input-validation-scanner plugin to examine the database access code. 2. Identify instances where user input is used directly in SQL queries without proper parameterization or escaping, indicatin