Back to Skills

security-pattern-check

verified

Identify security vulnerabilities and anti-patterns providing feedback on security issues a senior developer would catch. Use when user mentions security/vulnerability/safety concerns, code involves user input/authentication/data access, working with sensitive data (passwords/PII/financial), code includes SQL queries/file operations/external API calls, user asks about security best practices, or security-sensitive files are being modified (auth, payment, data access).

View on GitHub

Marketplace

marketplace-claude

kjgarza/marketplace-claude

Plugin

senior-software-developer

development

Repository

kjgarza/marketplace-claude
2stars

plugins/senior-software-developer/skills/security-pattern-check/SKILL.md

Last Verified

January 20, 2026

Install Skill

Select agents to install to:

Scope:
npx add-skill https://github.com/kjgarza/marketplace-claude/blob/main/plugins/senior-software-developer/skills/security-pattern-check/SKILL.md -a claude-code --skill security-pattern-check

Installation paths:

Claude
.claude/skills/security-pattern-check/
Powered by add-skill CLI

Instructions

# Security Pattern Check

Identify security vulnerabilities and anti-patterns in code, providing immediate feedback on security issues.

## Security Issue Categories

### 1. Injection Vulnerabilities
- **SQL Injection**: Unparameterized queries with user input
- **NoSQL Injection**: Unsanitized MongoDB queries
- **Command Injection**: Shell commands with user input
- **LDAP Injection**: Unescaped LDAP queries
- **XPath Injection**: Dynamic XPath expressions

### 2. Authentication & Authorization
- **Missing Authentication**: Unprotected endpoints
- **Weak Passwords**: No password strength requirements
- **Hardcoded Credentials**: Passwords/keys in code
- **Insecure Password Storage**: Plaintext or weak hashing (MD5, SHA1)
- **Missing Authorization**: No permission checks
- **Broken Access Control**: Users accessing resources they shouldn't

### 3. Sensitive Data Exposure
- **Logging Sensitive Data**: Passwords, tokens in logs
- **Insecure Storage**: Unencrypted sensitive data
- **Missing Encryption**: No TLS/SSL
- **Weak Encryption**: DES, RC4, custom crypto
- **Exposed Secrets**: API keys, tokens in code/config
- **Information Disclosure**: Stack traces, verbose errors to users

### 4. Cross-Site Scripting (XSS)
- **Reflected XSS**: Echoing user input in HTML
- **Stored XSS**: Saving unsanitized input to database
- **DOM XSS**: Client-side script injection
- **Missing Output Encoding**: Not escaping HTML/JavaScript

### 5. Cross-Site Request Forgery (CSRF)
- **Missing CSRF Tokens**: State-changing requests without tokens
- **Incorrect Token Validation**: Weak or missing validation
- **GET for State Changes**: Using GET for mutations

### 6. Security Misconfiguration
- **Debug Mode in Production**: Verbose error messages
- **Default Credentials**: Using default admin/admin
- **Unnecessary Services**: Unused endpoints or features enabled
- **Missing Security Headers**: No CSP, X-Frame-Options, etc.
- **Directory Listing**: Exposing file structure
- **Improper Error H

Validation Details

Front Matter
Required Fields
Valid Name Format
Valid Description
Has Sections
Allowed Tools
Instruction Length:
13853 chars