security-vuln-scanner扫描代码中常见安全漏洞如SQL注入、XSS、硬编码密码,提供检测结果和安全评分建议。
Install via ClawdBot CLI:
clawdbot install HonestQiao/security-vuln-scannerGrade Limited — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Potentially destructive shell commands in tool definitions
exec(Audited Apr 16, 2026 · audit v1.0
Generated Mar 20, 2026
Developers use this skill during code reviews to identify security flaws like SQL injection and XSS in web applications before deployment, ensuring compliance with security standards and reducing breach risks.
Integrate the scanner into CI/CD pipelines to automatically detect vulnerabilities in code commits, providing real-time feedback and enabling early remediation in agile development environments.
Financial institutions employ the skill to audit internal codebases for hardcoded secrets and command injection vulnerabilities, helping meet regulatory requirements and protect sensitive financial data.
E-commerce companies use the scanner to monitor their platforms for XSS and sensitive information leaks, safeguarding customer data and maintaining trust in online transactions.
Educational institutions incorporate the skill into cybersecurity courses to teach students about common vulnerabilities, using its detection patterns and output examples for hands-on learning.
Offer the scanner as a cloud service with monthly or annual subscriptions, providing continuous updates and support to developers and enterprises for scalable security scanning.
Sell perpetual licenses to large organizations for on-premises deployment, including customization options and dedicated support to integrate with existing security infrastructure.
Provide a free basic version for individual developers, with advanced features like detailed reports and priority scanning available through paid upgrades to attract a broad user base.
💬 Integration Tip
Integrate the scanner into your development environment using its trigger words and detection patterns for seamless, on-demand security checks during coding sessions.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.