code-security-auditorComprehensive code security audit with AI-powered vulnerability detection. Covers OWASP Top 10, dependency scanning, secret detection, SAST, and provides act...
Install via ClawdBot CLI:
clawdbot install zenmejiang-commits/code-security-auditorGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Accesses sensitive credential files or environment variables
/etc/passwdHardcoded API key or token pattern found in skill definition
sk-123456789...Potentially destructive shell commands in tool definitions
eval(Calls external URL not in known-safe list
https://owasp.org/www-community/attacks/SQL_InjectionGenerated Mar 20, 2026
Integrate the auditor into CI/CD pipelines to automatically scan every commit or pull request for vulnerabilities like hardcoded secrets and dependency flaws. This prevents insecure code from reaching production and enforces security standards early in development.
Use the tool to conduct thorough security audits of banking or fintech applications, ensuring compliance with regulations like PCI DSS by checking for OWASP Top 10 vulnerabilities, secure configurations, and proper authentication mechanisms.
Employ the auditor during penetration testing engagements to quickly identify high-risk vulnerabilities such as SQL injection and XSS, providing actionable fix recommendations to prioritize remediation efforts and reduce manual testing time.
Apply the tool to audit older codebases in industries like healthcare or manufacturing, scanning for outdated dependencies, insecure coding patterns, and configuration errors to guide secure refactoring and updates.
Utilize the auditor to assess e-commerce websites for vulnerabilities like CSRF and SSRF, ensuring secure payment processing and data integrity by checking session management and encryption practices.
Offer the auditor as a cloud service with tiered pricing based on scan frequency, project size, and features like AI verification. This provides recurring revenue and scales with customer usage across multiple teams.
Sell on-premise or private cloud licenses to large organizations needing full control over data and integration. Include premium support, custom rule sets, and training services for high-value contracts.
Provide a free version for basic scans on small projects, with paid upgrades for advanced features like dependency scanning, AI-driven verification, and detailed reporting. This attracts developers and converts them to paying customers.
💬 Integration Tip
Integrate the auditor early in development workflows using CLI commands in CI scripts, and leverage its JSON output for automated reporting and alerting in tools like Jira or Slack.
Scored Apr 19, 2026
Uses known external API (expected, informational)
raw.githubusercontent.comAI Analysis
The skill definition contains examples of security scanning patterns and commands (like credential regexes and shell commands) for educational/demonstration purposes, which triggered rule-based signals. However, there is no evidence of active credential harvesting, hidden instructions, or unauthorized data exfiltration. The external URLs referenced (OWASP, GitHub) are legitimate security resources consistent with the skill's stated purpose.
Audited Apr 17, 2026 · audit v1.0
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.