muguozi1-openclaw-security-auditorUse when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secret...
Install via ClawdBot CLI:
clawdbot install muguozi1/muguozi1-openclaw-security-auditorGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Accesses sensitive credential files or environment variables
process.env.API_KEYPotentially destructive shell commands in tool definitions
eval(Calls external URL not in known-safe list
https://api.example.comAudited Apr 17, 2026 · audit v1.0
Generated Mar 21, 2026
Audit an online store's checkout and payment processing code for vulnerabilities like SQL injection, XSS, and broken access control. Ensure secure handling of customer data, implement proper authentication with JWT, and configure CORS/CSP headers to protect against attacks.
Review a healthcare application's code for HIPAA compliance, focusing on encryption of sensitive patient data, secure authentication flows, and input validation to prevent injection attacks. Ensure error messages do not leak information and audit OWASP Top 10 vulnerabilities.
Conduct a security audit of a financial technology API, checking for vulnerabilities in authentication, authorization, and data encryption. Implement rate limiting on sensitive endpoints, validate JWT tokens rigorously, and ensure secrets are not exposed in logs or source code.
Perform a penetration test on a SaaS platform to identify security misconfigurations, such as default credentials or debug mode enabled in production. Design secure authorization flows, audit dependency vulnerabilities, and create security tests for ongoing monitoring.
Audit an educational website's code for XSS and injection vulnerabilities, particularly in user-generated content areas. Implement input sanitization with tools like DOMPurify, configure security headers, and ensure proper session management with HttpOnly cookies.
Offer specialized security audits and code reviews to businesses, charging per project or on a retainer basis. Provide actionable fixes for vulnerabilities identified using OWASP frameworks, helping clients meet compliance standards and reduce risk.
Develop a subscription service for ongoing security assessments, including regular vulnerability scans and code reviews. Integrate with CI/CD pipelines to provide continuous feedback, targeting tech companies needing proactive security measures.
Create and sell training courses or certifications on secure coding practices, leveraging the skill's expertise in OWASP Top 10 and audit processes. Target developers and IT teams looking to upskill in application security.
💬 Integration Tip
Integrate this skill into CI/CD pipelines to automate security checks during code commits, ensuring vulnerabilities are caught early. Use it for peer reviews to provide structured feedback on security issues.
Scored Apr 19, 2026
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
gws CLI: Shared patterns for authentication, global flags, and output formatting.
Set up Gmail API access via gog CLI with manual OAuth flow. Use when setting up Gmail integration, renewing expired OAuth tokens, or troubleshooting Gmail authentication on headless servers.
Automate OAuth login flows with user confirmation via Telegram. Supports 7 providers: Google, Apple, Microsoft, GitHub, Discord, WeChat, QQ. Features: - Auto-detect available OAuth options on login pages - Ask user to choose via Telegram when multiple options exist - Confirm before authorizing - Handle account selection and consent pages automatically
Self-hosted auth for TypeScript/Cloudflare Workers with social auth, 2FA, passkeys, organizations, RBAC, and 15+ plugins. Requires Drizzle ORM or Kysely for D1 (no direct adapter). Self-hosted alternative to Clerk/Auth.js. Use when: self-hosting auth on D1, building OAuth provider, multi-tenant SaaS, or troubleshooting D1 adapter errors, session caching, rate limits, Expo crashes, additionalFields bugs.
Build secure authentication with sessions, JWT, OAuth, passwordless, MFA, and SSO for web and mobile apps.