active
Security Scanner
Safe
System VerifiedSafe
OWASP Top 10 security scanner. Finds injection, XSS, broken auth, hardcoded secrets, vulnerable dependencies. Severity-ranked actionable report.
@api/security-scanner
security
owasp
scanner
devtools
Security Scanner
Purpose: Scan a codebase for security vulnerabilities following OWASP Top 10 and common CVE patterns. Produces an actionable report with severity rankings.
Invocation
code
/security-scan [path] [--severity critical|high|medium|all]
Default: scan entire project, report all severities.
Vulnerability Categories
A01: Broken Access Control
- Missing auth middleware on protected routes
- Direct object reference without ownership check
- CORS misconfiguration (
Access-Control-Allow-Origin: *) - Missing CSRF tokens on state-changing operations
A02: Cryptographic Failures
- Hardcoded secrets, API keys, tokens in source
- Weak hashing (MD5, SHA1 for passwords)
- Missing HTTPS enforcement
- Sensitive data in URL parameters or logs
A03: Injection
- SQL injection via string interpolation
- NoSQL injection through unsanitized query objects
- OS command injection via
exec(),spawn()with user input - LDAP, XPath, or template injection
A04: Insecure Design
- Missing rate limiting on auth endpoints
- No account lockout after failed attempts
- Password reset tokens without expiry
- Predictable resource IDs
A05: Security Misconfiguration
- Debug mode enabled in production config
- Default credentials in configuration files
- Verbose error messages exposing stack traces
- Unnecessary HTTP methods enabled
A07: Cross-Site Scripting (XSS)
- Unescaped user input rendered as HTML
dangerouslySetInnerHTMLwithout sanitization- Event handler injection through user-controlled attributes
- SVG/XML injection
A08: Software and Data Integrity
- Dependencies with known CVEs (check package-lock.json)
- Missing integrity checks on CDN resources
- Unsigned or unverified updates
A09: Logging & Monitoring Failures
- Sensitive data in log output (passwords, tokens, PII)
- Missing audit logging for admin operations
- No rate limit logging
Scan Process
- File Discovery — Glob for source files (
.ts,.js,.py,.go,.rb,.java) - Pattern Matching — AST-aware scan for vulnerability patterns
- Dependency Audit — Check
package-lock.json/requirements.txtagainst advisory databases - Secret Detection — Regex scan for API keys, tokens, passwords
- Configuration Review — Check env files, Docker configs, CI/CD pipelines
Output Format
code
🔴 CRITICAL | A03:Injection | src/api/users.ts:42
SQL query built with string concatenation using user input.
Fix: Use parameterized query: db.query('SELECT * FROM users WHERE id = $1', [userId])
🟡 MEDIUM | A02:Crypto | .env.example:3
Example env file contains what appears to be a real API key.
Fix: Replace with placeholder value: API_KEY=your-api-key-here
Summary Report
| Category | Critical | High | Medium | Low |
|---|---|---|---|---|
| Injection | 1 | 0 | 0 | 0 |
| Access Control | 0 | 2 | 1 | 0 |
| Crypto | 0 | 0 | 1 | 2 |
| XSS | 0 | 1 | 0 | 0 |
| Total | 1 | 3 | 2 | 2 |
Dormant$0/mo
$20 more to next tier
Created by
Info
Created February 18, 2026
Version 1.0.0
User-invoked
Terminal output
Embed
Add this skill card to any webpage.
<iframe src="https://skillslap.com/skill/35bc5d4c-dccd-4c63-81be-087a4c05f329/embed"
width="400" height="200"
style="border:none;border-radius:12px;"
title="SkillSlap Skill: Security Scanner">
</iframe>