// Identify security vulnerabilities, performance issues, and code quality problems through systematic analysis adapted to project's technology stack and domain. Use when reviewing code, assessing security, auditing. Triggers: 'security', 'vulnerability', 'audit', 'review', 'OWASP', 'injection', 'authentication', 'authorization', 'XSS', 'CSRF', 'secure', '๋ณด์', '์ทจ์ฝ์ ', '๊ฒํ ', '๋ฆฌ๋ทฐ', '๊ฐ์ฌ', '์ธ์ฆ', '์ธ๊ฐ', '๋ณด์๊ฒ์ฌ'.
| name | security-review |
| description | Identify security vulnerabilities, performance issues, and code quality problems through systematic analysis adapted to project's technology stack and domain. Use when reviewing code, assessing security, auditing. Triggers: 'security', 'vulnerability', 'audit', 'review', 'OWASP', 'injection', 'authentication', 'authorization', 'XSS', 'CSRF', 'secure', '๋ณด์', '์ทจ์ฝ์ ', '๊ฒํ ', '๋ฆฌ๋ทฐ', '๊ฐ์ฌ', '์ธ์ฆ', '์ธ๊ฐ', '๋ณด์๊ฒ์ฌ'. |
This skill provides comprehensive code review focusing on security, performance, and quality issues while providing constructive, actionable feedback.
Leverages: [codebase-analysis] skill for understanding project technology stack and security context.
Using [codebase-analysis]:
Systematic vulnerability analysis:
Technology-appropriate performance review:
Code quality in project context:
## Code Review Summary
**Overall Assessment**: [Excellent/Good/Needs Improvement/Requires Changes]
**Security Risk**: [Low/Medium/High/Critical]
**Performance Impact**: [Positive/Neutral/Negative]
### ๐จ Critical Issues (Must Fix)
**Location**: `file.ext:line`
**Risk**: [Vulnerability type]
**Impact**: [What can happen]
**Fix**: [Specific recommendation with code]
### ๐ก๏ธ Security Concerns (High Priority)
**Location**: `file.ext:line`
**Severity**: High
**OWASP Category**: [Category]
**Recommendation**: [Fix with code example]
### โก Performance Issues
**Location**: `file.ext:line`
**Impact**: [Performance degradation]
**Fix**: [Optimization with code]
### ๐ Quality Improvements (Recommended)
**Location**: `file.ext:line`
**Category**: [Maintainability/Readability/etc.]
**Suggestion**: [Improvement]
### โ
Good Practices Found
**Location**: `file.ext:line`
**Observation**: [What's done well]
**Why**: [Why this matters]
โ
"This SQL injection vulnerability exists because user input
from req.body.search is directly concatenated into the query.
In this project, use the existing db.query() helper which
handles parameterization automatically (see auth/login.ts:45)."
โ "SQL injection vulnerability. Fix it."
๐จ Critical: Fix immediately (security, data loss)
๐ก๏ธ High: Fix before release (security, major bugs)
โก Medium: Address soon (performance, maintainability)
๐ Low: Improve when convenient (style, minor optimizations)
โ
"This violates the project's Clean Code guideline of
<20 lines per function (see CLAUDE.md). Extract validation
logic into separate method following pattern from UserService."
โ "Function is too long."
Before finalizing review:
For comprehensive vulnerability examples and fixes, see:
Remember: A great review makes the codebase safer and better while helping developers grow. Use [codebase-analysis] to provide context-aware, technology-specific security and quality guidance.