A distributable application security review skill for Claude Code. Engineers add this to any project to get on-demand security analysis — at any point in development, not just at release gates.
Copy the .claude/commands/ directory into your project:
# From your project root
mkdir -p .claude/commands
cp /path/to/security-skill/.claude/commands/security-review.md .claude/commands/
cp /path/to/security-skill/.claude/commands/threat-model.md .claude/commands/Or clone and symlink:
mkdir -p .claude/commands
ln -s /path/to/security-skill/.claude/commands/security-review.md .claude/commands/security-review.md
ln -s /path/to/security-skill/.claude/commands/threat-model.md .claude/commands/threat-model.mdIn Claude Code, invoke the skills with slash commands:
/security-review
Reviews the entire project for vulnerabilities. Covers OWASP Top 10, authentication/authorization, injection, cryptographic issues, SSRF, access control, configuration, secrets, and more.
You can scope it:
/security-review Review the authentication module in src/auth/
/security-review Focus on the API endpoints in src/routes/
/security-review Review only the changes in this PR
/threat-model
Produces a STRIDE-based threat model by analyzing the actual codebase — not a generic template. Identifies data classifications, trust boundaries, attack surface, and prioritized threats.
| File | Purpose |
|---|---|
.claude/commands/security-review.md |
Code-level vulnerability review skill |
.claude/commands/threat-model.md |
Architecture-level threat modeling skill |
| File | Purpose |
|---|---|
AGENT.md |
Original coordinator agent spec (reference) |
threat.md |
Original threat modeling subagent spec (reference) |
compliance.md |
Original compliance mapping subagent spec (reference) |
code.md |
Original secure code review subagent spec (reference) |
The reference files document the original multi-agent security system these skills were derived from. They are not needed for the skills to function — only the two files in .claude/commands/ need to be distributed.
- Injection (SQL, NoSQL, command, template, LDAP)
- Broken authentication and session management
- Broken access control (IDOR, privilege escalation, mass assignment)
- Cryptographic failures
- Server-side request forgery (SSRF)
- Cross-site scripting (XSS)
- Insecure deserialization and prototype pollution
- Security misconfiguration (CORS, CSP, debug mode, headers)
- Vulnerable dependencies
- Path traversal
- Race conditions
- Open redirect
- Logging/secrets hygiene
These skills were built to address common failures in AI-assisted security reviews:
- Read the code, don't fill templates. Every finding must reference actual file paths and line numbers. No generic checklists.
- Assess in context. Severity considers exploitability, blast radius, and data sensitivity — not just vulnerability category.
- Stack-agnostic, stack-aware. Works on any language/framework but knows what to look for in each.
- Actionable output. Every finding includes the vulnerable code and a concrete remediation pattern.
- Acknowledge limits. The skill instructs Claude to flag what it can't determine rather than fabricate findings.