with one click
ln-621-security-auditor
// Checks hardcoded secrets, SQL injection, XSS, insecure deps, input validation. Use when auditing security.
// Checks hardcoded secrets, SQL injection, XSS, insecure deps, input validation. Use when auditing security.
[HINT] Download the complete skill directory including SKILL.md and all related files
| name | ln-621-security-auditor |
| description | Checks hardcoded secrets, SQL injection, XSS, insecure deps, input validation. Use when auditing security. |
| allowed-tools | Read, Grep, Glob, Bash, mcp__hex-graph__trace_dataflow, mcp__hex-line__read_file, mcp__hex-line__grep_search, mcp__hex-line__outline |
| license | MIT |
Paths: File paths (
references/,../ln-*) are relative to this skill directory.
Type: L3 Worker
Specialized worker auditing security vulnerabilities in codebase.
MANDATORY READ: Load references/audit_worker_core_contract.md.
Tool policy: follow host AGENTS.md MCP preferences; load references/mcp_tool_preferences.md and references/mcp_integration_patterns.md only when host policy is absent or MCP behavior is unclear.
Receives contextStore with: tech_stack, best_practices, principles, codebase_root, output_dir.
Use hex-graph first when dataflow or cross-file reference analysis materially improves confidence. Use hex-line first for local code reads when available. If MCP is unavailable, unsupported, or not indexed, continue with built-in Read/Grep/Glob/Bash and state the fallback in the report.
Detection policy: use two-layer detection (candidate scan, then context verification); load references/two_layer_detection.md only when the verification method is ambiguous.
innerHTML, | safe) -> confirmedreferences/templates/audit_worker_report_template.md, write to {output_dir}/ln-621--global.md in single Write callWhat: API keys, passwords, tokens, private keys in source code
Detection:
API_KEY = "...", password = "...", token = "...", SECRET = "...".ts, .js, .py, .go, .java, .cs.env.example, README.md, test files with mock dataSeverity:
Recommendation: Move to environment variables (.env), use secret management (Vault, AWS Secrets Manager)
Effort: S (replace hardcoded value with process.env.VAR_NAME)
What: String concatenation in SQL queries instead of parameterized queries
Detection:
query = "SELECT * FROM users WHERE id=" + userId, db.execute(f"SELECT * FROM {table}"), `SELECT * FROM ${table}`Severity:
Recommendation: Use parameterized queries (prepared statements), ORM query builders
Effort: M (refactor query to use placeholders)
What: Unsanitized user input rendered in HTML/templates
Detection:
innerHTML = userInput, dangerouslySetInnerHTML={{__html: data}}, echo $userInput;{{ var | safe }}, <%- var %>)Severity:
Recommendation: Use framework escaping (React auto-escapes, use textContent), sanitize with DOMPurify
Effort: S-M (replace innerHTML with textContent or sanitize)
What: Dependencies with known CVEs (Common Vulnerabilities and Exposures)
Detection:
npm audit (Node.js), pip-audit (Python), cargo audit (Rust), dotnet list package --vulnerable (.NET)Severity:
Recommendation: Update to patched versions, replace unmaintained packages
Effort: S-M (update package.json, test), L (if breaking changes)
What: Missing validation at system boundaries (API endpoints, user forms, file uploads)
Detection:
Severity:
Recommendation: Add validation middleware (Joi, Yup, express-validator), implement input sanitization
Effort: M (add validation schema and middleware)
MANDATORY READ: Load references/audit_scoring.md.
MANDATORY READ: Load references/templates/audit_worker_report_template.md.
Write JSON summary per references/audit_summary_contract.md. In managed mode the caller passes both runId and summaryArtifactPath; in standalone mode the worker generates its own run-scoped artifact path per shared contract.
Write report to {output_dir}/ln-621--global.md with category: "Security" and checks: hardcoded_secrets, sql_injection, xss_vulnerabilities, insecure_dependencies, missing_input_validation.
Return summary per references/audit_summary_contract.md.
Standalone mode still writes the same JSON summary to a worker-owned run-scoped artifact path per shared contract.
Apply the already-loaded references/audit_worker_core_contract.md.
file:line for programmatic navigationApply the already-loaded references/audit_worker_core_contract.md.
{output_dir}/ln-621--global.md (atomic single Write call)references/audit_output_schema.mdVersion: 3.0.0 Last Updated: 2025-12-23