askill
security-review

security-reviewSafety 100Repository

Perform a security review checklist when changes touch authentication, authorization, cryptography, secrets, or external interfaces.

0 stars
1.2k downloads
Updated 2/14/2026

Package Files

Loading files...
SKILL.md

Security Review

Use this skill when a code change touches security-sensitive areas.

When to Trigger

  • Authentication or authorization logic is added or modified.
  • Cryptographic operations are introduced or changed.
  • Secrets, tokens, or credentials are handled.
  • External APIs or network boundaries are affected.
  • User input handling or validation is changed.
  • Dependencies are added or updated.

Checklist

Cryptography & Compliance

  • Only FIPS-validated algorithms used (AES, SHA-256/384/512, TLS 1.2+)
  • No non-compliant primitives (MD5, RC4, non-FIPS RNGs)
  • Encryption at rest and in transit for sensitive data

Authentication & Authorization

  • Zero-trust applied: every request authenticated and authorized
  • Least privilege enforced for all roles and service accounts
  • No hardcoded credentials, tokens, or keys
  • Secrets sourced from secret manager or environment injection

Input & Interface

  • All external inputs validated and sanitized
  • OWASP Top 10 considered for web-facing changes
  • API surface deliberately designed (Hyrum's Law)

Dependencies

  • New dependencies justified (not available in stdlib?)
  • Versions pinned, checksums verified
  • Transitive dependencies audited
  • License compatibility confirmed

Observability

  • Security-relevant events logged (auth failures, access denials, config changes)
  • No secrets or PII in logs
  • Audit trail traceable

Output

Document which items were reviewed and their status. If any items are not applicable, note why.

Install

Download ZIP
Requires askill CLI v1.0+

AI Quality Score

90/100Analyzed 2/20/2026

High-quality security review checklist skill with clear triggers, comprehensive coverage of security areas (cryptography, authentication, authorization, input validation, dependencies, observability), and well-structured actionable items. Tags and proper metadata enhance discoverability. Reusable across projects. No rule violations detected."

100
90
90
85
90

Metadata

Licenseunknown
Version1.0.0
Updated2/14/2026
PublisherHunterGerlach

Tags

apisecurity