security analysis and remediation AI skills
What It Does • Install • crack-seer • dr-crack • Workflow
Two AI skills. One security workflow. Drop into any agent — Claude Code, Codex, Cursor, and more.
- crack-seer → scans codebase, finds every vulnerability, outputs
SECURITY_REPORT.md - dr-crack → reads report, writes
SECURITY_FIX_PLAN.md, optionally patches files one by one
Separation of concerns: crack-seer = detection only. dr-crack = remediation only.
|
|
Same codebase. Full coverage. Zero guessing.
┌──────────────────────────────────────┐
│ VULNERABILITIES CAUGHT ████████ 13+ │
│ OWASP COVERAGE ████████ 100%│
│ FIXES APPLIED ████████ 1× │
│ ARCHITECTURE PRESERVED ████████ YES │
└──────────────────────────────────────┘
Claude Code supports skills natively via SKILL.md files in ~/.claude/skills/.
# crack-seer
mkdir -p ~/.claude/skills/crack-seer
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/crack-seer/SKILL.md \
-o ~/.claude/skills/crack-seer/SKILL.md
# dr-crack
mkdir -p ~/.claude/skills/dr-crack
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/dr-crack/SKILL.md \
-o ~/.claude/skills/dr-crack/SKILL.mdTrigger: type /crack-seer or say "Audit this repo for security issues."
Then /dr-crack or "Generate a fix plan."
Auto-fix: "Apply patches automatically."
Codex reads from AGENTS.md. Add skills globally or per project.
# Global (all projects)
mkdir -p ~/.codex
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/crack-seer/crack_seer.md >> ~/.codex/AGENTS.md
echo "" >> ~/.codex/AGENTS.md
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/dr-crack/dr_crack.md >> ~/.codex/AGENTS.md
# Per project (in your repo root)
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/crack-seer/crack_seer.md > AGENTS.md
echo "" >> AGENTS.md
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/dr-crack/dr_crack.md >> AGENTS.mdTrigger: "Run crack-seer on this project." → "Run dr-crack." → "Fix automatically."
Verify active instructions: codex "Summarize the current instructions."
Cursor reads rules from .cursor/rules/*.mdc (recommended) or .cursorrules (legacy).
mkdir -p .cursor/rules
# crack-seer rule
printf -- '---\ndescription: Security vulnerability scanner. Invoke when asked to audit, scan, or analyze for security issues.\nglobs: "**/*"\n---\n' \
> .cursor/rules/crack-seer.mdc
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/crack-seer/crack_seer.md \
>> .cursor/rules/crack-seer.mdc
# dr-crack rule
printf -- '---\ndescription: Security remediation engine. Invoke when asked to fix or patch vulnerabilities from SECURITY_REPORT.md.\nglobs: "**/*"\n---\n' \
> .cursor/rules/dr-crack.mdc
curl -fsSL https://raw.githubusercontent.com/risal-ea/code-crack/main/dr-crack/dr_crack.md \
>> .cursor/rules/dr-crack.mdcOpen Agent mode (Cmd+I → Agent) and say:
"Run crack-seer on this project and generate SECURITY_REPORT.md"
Then: "Run dr-crack and create SECURITY_FIX_PLAN.md"
Static security analyzer. Read-only. No fixes.
Scans for:
| Category | Examples |
|---|---|
| Secrets | Hardcoded API keys, tokens, passwords |
| Storage | Insecure local storage, plaintext persistence |
| Auth | Authentication flaws, authorization bypass |
| Injection | SQL, command, path traversal |
| Web | XSS, CSRF, misconfigured CORS |
| Network | HTTP instead of HTTPS, no cert pinning |
| Crypto | Weak algorithms, broken implementations |
| Code | Sensitive logging, debug configs in prod |
| Deps | Known vulnerable dependency versions |
Each issue gets:
- Issue ID — stable identifier (CRK-001, CRK-002…)
- File path + code snippet
- Risk explanation + attack scenario
- OWASP Top 10 mapping
- CWE ID
- Severity score (0–10)
Output: SECURITY_REPORT.md
Remediation engine. Reads SECURITY_REPORT.md. Writes fix plan.
Processes issues Critical → High → Medium → Low.
For each issue:
- Root cause explanation
- Step-by-step fix instructions
- Secure code examples
- Migration notes and side effects
- Post-fix verification steps
Output: SECURITY_FIX_PLAN.md
Say "Fix automatically", "Apply patches", or "Fix with AI".
Rules:
- One issue at a time — highest severity first
- Shows file name, before code, after code, explanation
- Waits for confirmation before next issue
- Never removes functionality unless required for security
- Preserves architecture style (Clean Architecture, BLoC, DI, etc.)
Behaves like a cautious senior security engineer applying patches carefully.
Project Code
↓
crack-seer → SECURITY_REPORT.md
↓
dr-crack → SECURITY_FIX_PLAN.md
↓
(Optional) Auto-Fix Mode → patches applied file by file
| Tool | Files to use | Install location |
|---|---|---|
| Claude Code | SKILL.md |
~/.claude/skills/<skill-name>/SKILL.md |
| Codex | crack_seer.md + dr_crack.md |
~/.codex/AGENTS.md or ./AGENTS.md |
| Cursor | crack_seer.md + dr_crack.md |
.cursor/rules/*.mdc or .cursorrules |
- crack-seer/SKILL.md — Claude Code skill definition
- crack-seer/crack_seer.md — full instructions (Codex / Cursor)
- dr-crack/SKILL.md — Claude Code skill definition
- dr-crack/dr_crack.md — full instructions (Codex / Cursor)
- Issues — bug, feature, weird behavior
MIT — find bug. fix bug. ship safe code.
