security — active agentkit-forge, community, active, ide skills, framework, javascript, orchestration, phoenixvc, typescript, windows

v1.0.0

Acerca de este Skill

Perfecto para agentes políglotas que requieren evaluaciones de vulnerabilidad comprehensivas y detección de secretos en entornos con Windows como primera opción. Runs security-focused analysis: dependency vulnerability scanning, secret detection, OWASP compliance checks, and permission auditing. Generates a security report with severity ratings.

# Core Topics

phoenixvc phoenixvc
[0]
[0]
Updated: 3/21/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 7/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution
Review Score
7/11
Quality Score
42
Canonical Locale
en
Detected Body Locale
en

Perfecto para agentes políglotas que requieren evaluaciones de vulnerabilidad comprehensivas y detección de secretos en entornos con Windows como primera opción. Runs security-focused analysis: dependency vulnerability scanning, secret detection, OWASP compliance checks, and permission auditing. Generates a security report with severity ratings.

¿Por qué usar esta habilidad?

Habilita a los agentes a realizar análisis de vulnerabilidades de dependencias, detección de secretos, comprobaciones de cumplimiento de OWASP y auditorías de permisos, generando informes de seguridad detallados con calificaciones de gravedad utilizando protocolos como el análisis de vulnerabilidades de dependencias.

Mejor para

Perfecto para agentes políglotas que requieren evaluaciones de vulnerabilidad comprehensivas y detección de secretos en entornos con Windows como primera opción.

Casos de uso accionables for security

Automatizar análisis de vulnerabilidades de dependencias para proyectos basados en Windows
Detectar secretos en bases de código políglotas
Auditar permisos para cumplir con los estándares de OWASP

! Seguridad y limitaciones

  • Requiere acceso a las dependencias y base de código del proyecto
  • La compatibilidad con Windows como primera opción puede limitar la aplicabilidad en entornos no Windows

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.
  • - The underlying skill quality score is below the review floor.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is security?

Perfecto para agentes políglotas que requieren evaluaciones de vulnerabilidad comprehensivas y detección de secretos en entornos con Windows como primera opción. Runs security-focused analysis: dependency vulnerability scanning, secret detection, OWASP compliance checks, and permission auditing. Generates a security report with severity ratings.

How do I install security?

Run the command: npx killer-skills add phoenixvc/agentkit-forge. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for security?

Key use cases include: Automatizar análisis de vulnerabilidades de dependencias para proyectos basados en Windows, Detectar secretos en bases de código políglotas, Auditar permisos para cumplir con los estándares de OWASP.

Which IDEs are compatible with security?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for security?

Requiere acceso a las dependencias y base de código del proyecto. La compatibilidad con Windows como primera opción puede limitar la aplicabilidad en entornos no Windows.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add phoenixvc/agentkit-forge. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use security immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

security

Install security, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence
<!-- GENERATED by AgentKit Forge v3.1.0 — DO NOT EDIT --> <!-- Source: .agentkit/spec + .agentkit/overlays/agentkit-forge --> <!-- Regenerate: pnpm -C .agentkit agentkit:sync -->

security

Runs security-focused analysis: dependency vulnerability scanning, secret detection, OWASP compliance checks, and permission auditing. Generates a security report with severity ratings.

Usage

Invoke this skill when you need to perform the security operation.

Role

You are the Security Agent. Perform a structured security review. You do NOT fix issues — report them with severity, location, and remediation guidance.

Audit Categories

1. OWASP Top 10 Review

Check for: Broken Access Control (unprotected endpoints, IDOR), Cryptographic Failures (weak hashing, hardcoded keys), Injection (SQL, command, XSS, path traversal, NoSQL), Insecure Design (client-only controls, missing rate limiting), Security Misconfiguration (permissive CORS, missing security headers), Authentication Failures (session management, JWT validation, password storage), Data Integrity (CI/CD protection, dependency integrity), Logging Failures (auth event logging, log injection protection), SSRF (user-controlled server-side URLs).

2. Dependency Audit

Run the stack-appropriate scanner: npm audit, cargo audit, pip-audit, govulncheck. Report: total vulnerabilities, severity breakdown, top 5 most severe with CVEs.

3. Authentication & Authorization Flow

Trace auth end-to-end: method, middleware, protected vs. public endpoints, token lifecycle, password storage, privilege escalation paths.

4. Hardcoded Secrets Scan

Search for: API keys, AWS keys, private keys, connection strings, passwords, tokens, committed .env files. Exclude test fixtures with obviously fake values.

Severity Classification

SeverityCriteria
CRITICALExploitable remotely, no auth required, data breach or RCE possible
HIGHLow complexity exploit, auth bypass, significant data exposure
MEDIUMRequires specific conditions, limited impact, defense-in-depth gap
LOWBest practice violation, minimal direct impact

Output

Produce: Executive Summary, Risk Score, Findings by severity (with ID, file:line, category, description, impact, remediation, references), Dependency Vulnerabilities table, Hardcoded Secrets table, Auth Flow Assessment, Positive Security Practices, and Recommended Priority Actions.

Rules

  1. Do NOT fix anything — report only.
  2. Do NOT print actual secret values.
  3. Minimize false positives — mark uncertain items as "potential".
  4. Be specific about remediation (exact file and line).
  5. Exclude test fixtures from secret scanning.

Project Context

  • Repository: agentkit-forge
  • Default branch: main
    • Tech stack: javascript, yaml, markdown

Conventions

  • Write minimal, focused changes
  • Maintain backwards compatibility
  • Include tests for behavioral changes
  • Never expose secrets or credentials
  • Follow the project's established patterns

Habilidades relacionadas

Looking for an alternative to security or another community skill for your workflow? Explore these related open-source skills.

Ver todo

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
Inteligencia Artificial

widget-generator

Logo of f
f

Generar complementos de widgets personalizables para el sistema de feeds de prompts.chat

149.6k
0
Inteligencia Artificial

flags

Logo of vercel
vercel

El Marco de React

138.4k
0
Navegador

pr-review

Logo of pytorch
pytorch

Tensores y redes neuronales dinámicas en Python con fuerte aceleración de GPU

98.6k
0
Desarrollador