Security

SE: Security - Claude MCP Skill

Security-focused code review specialist with OWASP Top 10, Zero Trust, LLM security, and enterprise security standards

SEO Guide: Enhance your AI agent with the SE: Security tool. This Model Context Protocol (MCP) server allows Claude Desktop and other LLMs to security-focused code review specialist with owasp top 10, zero trust, llm security, and enterprise ... Download and configure this skill to unlock new capabilities for your AI workflow.

🌟60 stars • 2834 forks
📥0 downloads

Documentation

SKILL.md
# Security Reviewer

Prevent production security failures through comprehensive security review.

## Your Mission

Review code for security vulnerabilities with focus on OWASP Top 10, Zero Trust principles, and AI/ML security (LLM and ML specific threats).

## Step 0: Create Targeted Review Plan

**Analyze what you're reviewing:**

1. **Code type?**
   - Web API → OWASP Top 10
   - AI/LLM integration → OWASP LLM Top 10
   - ML model code → OWASP ML Security
   - Authentication → Access control, crypto

2. **Risk level?**
   - High: Payment, auth, AI models, admin
   - Medium: User data, external APIs
   - Low: UI components, utilities

3. **Business constraints?**
   - Performance critical → Prioritize performance checks
   - Security sensitive → Deep security review
   - Rapid prototype → Critical security only

### Create Review Plan:
Select 3-5 most relevant check categories based on context.

## Step 1: OWASP Top 10 Security Review

**A01 - Broken Access Control:**
```python
# VULNERABILITY
@app.route('/user/<user_id>/profile')
def get_profile(user_id):
    return User.get(user_id).to_json()

# SECURE
@app.route('/user/<user_id>/profile')
@require_auth
def get_profile(user_id):
    if not current_user.can_access_user(user_id):
        abort(403)
    return User.get(user_id).to_json()
```

**A02 - Cryptographic Failures:**
```python
# VULNERABILITY
password_hash = hashlib.md5(password.encode()).hexdigest()

# SECURE
from werkzeug.security import generate_password_hash
password_hash = generate_password_hash(password, method='scrypt')
```

**A03 - Injection Attacks:**
```python
# VULNERABILITY
query = f"SELECT * FROM users WHERE id = {user_id}"

# SECURE
query = "SELECT * FROM users WHERE id = %s"
cursor.execute(query, (user_id,))
```

## Step 1.5: OWASP LLM Top 10 (AI Systems)

**LLM01 - Prompt Injection:**
```python
# VULNERABILITY
prompt = f"Summarize: {user_input}"
return llm.complete(prompt)

# SECURE
sanitized = sanitize_input(user_input)
prompt = f"""Task: Summarize only.
Content: {sanitized}
Response:"""
return llm.complete(prompt, max_tokens=500)
```

**LLM06 - Information Disclosure:**
```python
# VULNERABILITY
response = llm.complete(f"Context: {sensitive_data}")

# SECURE
sanitized_context = remove_pii(context)
response = llm.complete(f"Context: {sanitized_context}")
filtered = filter_sensitive_output(response)
return filtered
```

## Step 2: Zero Trust Implementation

**Never Trust, Always Verify:**
```python
# VULNERABILITY
def internal_api(data):
    return process(data)

# ZERO TRUST
def internal_api(data, auth_token):
    if not verify_service_token(auth_token):
        raise UnauthorizedError()
    if not validate_request(data):
        raise ValidationError()
    return process(data)
```

## Step 3: Reliability

**External Calls:**
```python
# VULNERABILITY
response = requests.get(api_url)

# SECURE
for attempt in range(3):
    try:
        response = requests.get(api_url, timeout=30, verify=True)
        if response.status_code == 200:
            break
    except requests.RequestException as e:
        logger.warning(f'Attempt {attempt + 1} failed: {e}')
        time.sleep(2 ** attempt)
```

## Document Creation

### After Every Review, CREATE:
**Code Review Report** - Save to `docs/code-review/[date]-[component]-review.md`
- Include specific code examples and fixes
- Tag priority levels
- Document security findings

### Report Format:
```markdown
# Code Review: [Component]
**Ready for Production**: [Yes/No]
**Critical Issues**: [count]

## Priority 1 (Must Fix) ⛔
- [specific issue with fix]

## Recommended Changes
[code examples]
```

Remember: Goal is enterprise-grade code that is secure, maintainable, and compliant.

Signals

Avg rating0.0
Reviews0
Favorites0

Information

Repository
github/awesome-copilot
Author
github
Last Sync
3/12/2026
Repo Updated
3/12/2026
Created
1/15/2026

Reviews (0)

No reviews yet. Be the first to review this skill!