cp-toolkit 2.2.3 → 2.2.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/package.json +1 -1
  2. package/src/commands/add.js +23 -16
  3. package/src/commands/doctor.js +15 -10
  4. package/src/commands/init.js +147 -21
  5. package/templates/AGENTS.md +47 -0
  6. package/templates/ARCHITECTURE.md +42 -0
  7. package/templates/agents/backend-specialist.md +1 -0
  8. package/templates/agents/code-archaeologist.md +116 -106
  9. package/templates/agents/database-architect.md +1 -0
  10. package/templates/agents/debugger.md +1 -0
  11. package/templates/agents/devops-engineer.md +1 -0
  12. package/templates/agents/documentation-writer.md +1 -0
  13. package/templates/agents/explorer-agent.md +83 -73
  14. package/templates/agents/frontend-specialist.md +1 -0
  15. package/templates/agents/game-developer.md +1 -0
  16. package/templates/agents/mobile-developer.md +1 -0
  17. package/templates/agents/orchestrator.md +426 -416
  18. package/templates/agents/penetration-tester.md +1 -0
  19. package/templates/agents/performance-optimizer.md +1 -0
  20. package/templates/agents/product-manager.md +122 -112
  21. package/templates/agents/product-owner.md +105 -95
  22. package/templates/agents/project-planner.md +416 -406
  23. package/templates/agents/qa-automation-engineer.md +113 -103
  24. package/templates/agents/security-auditor.md +1 -0
  25. package/templates/agents/seo-specialist.md +1 -0
  26. package/templates/agents/test-engineer.md +1 -0
  27. package/templates/skills/core/behavioral-modes/SKILL.md +244 -242
  28. package/templates/skills/core/brainstorming/SKILL.md +166 -163
  29. package/templates/skills/core/mcp-builder/SKILL.md +178 -176
  30. package/templates/skills/core/parallel-agents/SKILL.md +187 -175
  31. package/templates/skills/core/plan-writing/SKILL.md +154 -152
  32. package/templates/skills/optional/api-patterns/SKILL.md +83 -81
  33. package/templates/skills/optional/app-builder/SKILL.md +78 -75
  34. package/templates/skills/optional/app-builder/templates/SKILL.md +41 -39
  35. package/templates/skills/optional/architecture/SKILL.md +58 -55
  36. package/templates/skills/optional/bash-linux/SKILL.md +201 -199
  37. package/templates/skills/optional/code-review-checklist/SKILL.md +110 -109
  38. package/templates/skills/optional/database-design/SKILL.md +54 -52
  39. package/templates/skills/optional/deployment-procedures/SKILL.md +243 -241
  40. package/templates/skills/optional/documentation-templates/SKILL.md +196 -194
  41. package/templates/skills/optional/frontend-design/SKILL.md +421 -418
  42. package/templates/skills/optional/game-development/2d-games/SKILL.md +120 -119
  43. package/templates/skills/optional/game-development/3d-games/SKILL.md +136 -135
  44. package/templates/skills/optional/game-development/SKILL.md +169 -167
  45. package/templates/skills/optional/game-development/game-art/SKILL.md +187 -185
  46. package/templates/skills/optional/game-development/game-audio/SKILL.md +192 -190
  47. package/templates/skills/optional/game-development/game-design/SKILL.md +131 -129
  48. package/templates/skills/optional/game-development/mobile-games/SKILL.md +110 -108
  49. package/templates/skills/optional/game-development/multiplayer/SKILL.md +133 -132
  50. package/templates/skills/optional/game-development/pc-games/SKILL.md +146 -144
  51. package/templates/skills/optional/game-development/vr-ar/SKILL.md +124 -123
  52. package/templates/skills/optional/game-development/web-games/SKILL.md +152 -150
  53. package/templates/skills/optional/geo-fundamentals/SKILL.md +158 -156
  54. package/templates/skills/optional/i18n-localization/SKILL.md +156 -154
  55. package/templates/skills/optional/lint-and-validate/SKILL.md +48 -45
  56. package/templates/skills/optional/mobile-design/SKILL.md +397 -394
  57. package/templates/skills/optional/nextjs-react-expert/SKILL.md +271 -267
  58. package/templates/skills/optional/nodejs-best-practices/SKILL.md +335 -333
  59. package/templates/skills/optional/performance-profiling/SKILL.md +145 -143
  60. package/templates/skills/optional/powershell-windows/SKILL.md +169 -167
  61. package/templates/skills/optional/python-patterns/SKILL.md +443 -441
  62. package/templates/skills/optional/red-team-tactics/SKILL.md +201 -199
  63. package/templates/skills/optional/seo-fundamentals/SKILL.md +130 -129
  64. package/templates/skills/optional/server-management/SKILL.md +163 -161
  65. package/templates/skills/optional/systematic-debugging/SKILL.md +111 -109
  66. package/templates/skills/optional/tailwind-patterns/SKILL.md +271 -269
  67. package/templates/skills/optional/tdd-workflow/SKILL.md +150 -149
  68. package/templates/skills/optional/testing-patterns/SKILL.md +179 -178
  69. package/templates/skills/optional/vulnerability-scanner/SKILL.md +278 -276
  70. package/templates/skills/optional/web-design-guidelines/SKILL.md +60 -57
  71. package/templates/skills/optional/webapp-testing/SKILL.md +188 -187
@@ -1,276 +1,278 @@
1
- ---
2
- name: vulnerability-scanner
3
- description: Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
4
- allowed-tools: Read, Glob, Grep, Bash
5
- ---
6
-
7
- # Vulnerability Scanner
8
-
9
- > Think like an attacker, defend like an expert. 2025 threat landscape awareness.
10
-
11
- ## 🔧 Runtime Scripts
12
-
13
- **Execute for automated validation:**
14
-
15
- | Script | Purpose | Usage |
16
- |--------|---------|-------|
17
- | `scripts/security_scan.py` | Validate security principles applied | `python scripts/security_scan.py <project_path>` |
18
-
19
- ## 📋 Reference Files
20
-
21
- | File | Purpose |
22
- |------|---------|
23
- | [checklists.md](checklists.md) | OWASP Top 10, Auth, API, Data protection checklists |
24
-
25
- ---
26
-
27
- ## 1. Security Expert Mindset
28
-
29
- ### Core Principles
30
-
31
- | Principle | Application |
32
- |-----------|-------------|
33
- | **Assume Breach** | Design as if attacker already inside |
34
- | **Zero Trust** | Never trust, always verify |
35
- | **Defense in Depth** | Multiple layers, no single point |
36
- | **Least Privilege** | Minimum required access only |
37
- | **Fail Secure** | On error, deny access |
38
-
39
- ### Threat Modeling Questions
40
-
41
- Before scanning, ask:
42
- 1. What are we protecting? (Assets)
43
- 2. Who would attack? (Threat actors)
44
- 3. How would they attack? (Attack vectors)
45
- 4. What's the impact? (Business risk)
46
-
47
- ---
48
-
49
- ## 2. OWASP Top 10:2025
50
-
51
- ### Risk Categories
52
-
53
- | Rank | Category | Think About |
54
- |------|----------|-------------|
55
- | **A01** | Broken Access Control | Who can access what? IDOR, SSRF |
56
- | **A02** | Security Misconfiguration | Defaults, headers, exposed services |
57
- | **A03** | Software Supply Chain 🆕 | Dependencies, CI/CD, build integrity |
58
- | **A04** | Cryptographic Failures | Weak crypto, exposed secrets |
59
- | **A05** | Injection | User input system commands |
60
- | **A06** | Insecure Design | Flawed architecture |
61
- | **A07** | Authentication Failures | Session, credential management |
62
- | **A08** | Integrity Failures | Unsigned updates, tampered data |
63
- | **A09** | Logging & Alerting | Blind spots, no monitoring |
64
- | **A10** | Exceptional Conditions 🆕 | Error handling, fail-open states |
65
-
66
- ### 2025 Key Changes
67
-
68
- ```
69
- 2021 → 2025 Shifts:
70
- ├── SSRF merged into A01 (Access Control)
71
- ├── A02 elevated (Cloud/Container configs)
72
- ├── A03 NEW: Supply Chain (major focus)
73
- ├── A10 NEW: Exceptional Conditions
74
- └── Focus shift: Root causes > Symptoms
75
- ```
76
-
77
- ---
78
-
79
- ## 3. Supply Chain Security (A03)
80
-
81
- ### Attack Surface
82
-
83
- | Vector | Risk | Question to Ask |
84
- |--------|------|-----------------|
85
- | **Dependencies** | Malicious packages | Do we audit new deps? |
86
- | **Lock files** | Integrity attacks | Are they committed? |
87
- | **Build pipeline** | CI/CD compromise | Who can modify? |
88
- | **Registry** | Typosquatting | Verified sources? |
89
-
90
- ### Defense Principles
91
-
92
- - Verify package integrity (checksums)
93
- - Pin versions, audit updates
94
- - Use private registries for critical deps
95
- - Sign and verify artifacts
96
-
97
- ---
98
-
99
- ## 4. Attack Surface Mapping
100
-
101
- ### What to Map
102
-
103
- | Category | Elements |
104
- |----------|----------|
105
- | **Entry Points** | APIs, forms, file uploads |
106
- | **Data Flows** | Input → Process → Output |
107
- | **Trust Boundaries** | Where auth/authz checked |
108
- | **Assets** | Secrets, PII, business data |
109
-
110
- ### Prioritization Matrix
111
-
112
- ```
113
- Risk = Likelihood × Impact
114
-
115
- High Impact + High Likelihood CRITICAL
116
- High Impact + Low Likelihood → HIGH
117
- Low Impact + High Likelihood MEDIUM
118
- Low Impact + Low Likelihood LOW
119
- ```
120
-
121
- ---
122
-
123
- ## 5. Risk Prioritization
124
-
125
- ### CVSS + Context
126
-
127
- | Factor | Weight | Question |
128
- |--------|--------|----------|
129
- | **CVSS Score** | Base severity | How severe is the vuln? |
130
- | **EPSS Score** | Exploit likelihood | Is it being exploited? |
131
- | **Asset Value** | Business context | What's at risk? |
132
- | **Exposure** | Attack surface | Internet-facing? |
133
-
134
- ### Prioritization Decision Tree
135
-
136
- ```
137
- Is it actively exploited (EPSS >0.5)?
138
- ├── YES → CRITICAL: Immediate action
139
- └── NO Check CVSS
140
- ├── CVSS ≥9.0 HIGH
141
- ├── CVSS 7.0-8.9 Consider asset value
142
- └── CVSS <7.0 → Schedule for later
143
- ```
144
-
145
- ---
146
-
147
- ## 6. Exceptional Conditions (A10 - New)
148
-
149
- ### Fail-Open vs Fail-Closed
150
-
151
- | Scenario | Fail-Open (BAD) | Fail-Closed (GOOD) |
152
- |----------|-----------------|---------------------|
153
- | Auth error | Allow access | Deny access |
154
- | Parsing fails | Accept input | Reject input |
155
- | Timeout | Retry forever | Limit + abort |
156
-
157
- ### What to Check
158
-
159
- - Exception handlers that catch-all and ignore
160
- - Missing error handling on security operations
161
- - Race conditions in auth/authz
162
- - Resource exhaustion scenarios
163
-
164
- ---
165
-
166
- ## 7. Scanning Methodology
167
-
168
- ### Phase-Based Approach
169
-
170
- ```
171
- 1. RECONNAISSANCE
172
- └── Understand the target
173
- ├── Technology stack
174
- ├── Entry points
175
- └── Data flows
176
-
177
- 2. DISCOVERY
178
- └── Identify potential issues
179
- ├── Configuration review
180
- ├── Dependency analysis
181
- └── Code pattern search
182
-
183
- 3. ANALYSIS
184
- └── Validate and prioritize
185
- ├── False positive elimination
186
- ├── Risk scoring
187
- └── Attack chain mapping
188
-
189
- 4. REPORTING
190
- └── Actionable findings
191
- ├── Clear reproduction steps
192
- ├── Business impact
193
- └── Remediation guidance
194
- ```
195
-
196
- ---
197
-
198
- ## 8. Code Pattern Analysis
199
-
200
- ### High-Risk Patterns
201
-
202
- | Pattern | Risk | Look For |
203
- |---------|------|----------|
204
- | **String concat in queries** | Injection | `"SELECT * FROM " + user_input` |
205
- | **Dynamic code execution** | RCE | `eval()`, `exec()`, `Function()` |
206
- | **Unsafe deserialization** | RCE | `pickle.loads()`, `unserialize()` |
207
- | **Path manipulation** | Traversal | User input in file paths |
208
- | **Disabled security** | Various | `verify=False`, `--insecure` |
209
-
210
- ### Secret Patterns
211
-
212
- | Type | Indicators |
213
- |------|-----------|
214
- | API Keys | `api_key`, `apikey`, high entropy |
215
- | Tokens | `token`, `bearer`, `jwt` |
216
- | Credentials | `password`, `secret`, `key` |
217
- | Cloud | `AWS_`, `AZURE_`, `GCP_` prefixes |
218
-
219
- ---
220
-
221
- ## 9. Cloud Security Considerations
222
-
223
- ### Shared Responsibility
224
-
225
- | Layer | You Own | Provider Owns |
226
- |-------|---------|---------------|
227
- | Data | | |
228
- | Application | ✅ | ❌ |
229
- | OS/Runtime | Depends | Depends |
230
- | Infrastructure | | |
231
-
232
- ### Cloud-Specific Checks
233
-
234
- - IAM: Least privilege applied?
235
- - Storage: Public buckets?
236
- - Network: Security groups tightened?
237
- - Secrets: Using secrets manager?
238
-
239
- ---
240
-
241
- ## 10. Anti-Patterns
242
-
243
- | Don't | ✅ Do |
244
- |----------|-------|
245
- | Scan without understanding | Map attack surface first |
246
- | Alert on every CVE | Prioritize by exploitability + asset |
247
- | Ignore false positives | Maintain verified baseline |
248
- | Fix symptoms only | Address root causes |
249
- | Scan once before deploy | Continuous scanning |
250
- | Trust third-party deps blindly | Verify integrity, audit code |
251
-
252
- ---
253
-
254
- ## 11. Reporting Principles
255
-
256
- ### Finding Structure
257
-
258
- Each finding should answer:
259
- 1. **What?** - Clear vulnerability description
260
- 2. **Where?** - Exact location (file, line, endpoint)
261
- 3. **Why?** - Root cause explanation
262
- 4. **Impact?** - Business consequence
263
- 5. **How to fix?** - Specific remediation
264
-
265
- ### Severity Classification
266
-
267
- | Severity | Criteria |
268
- |----------|----------|
269
- | **Critical** | RCE, auth bypass, mass data exposure |
270
- | **High** | Data exposure, privilege escalation |
271
- | **Medium** | Limited scope, requires conditions |
272
- | **Low** | Informational, best practice |
273
-
274
- ---
275
-
276
- > **Remember:** Vulnerability scanning finds issues. Expert thinking prioritizes what matters. Always ask: "What would an attacker do with this?"
1
+ ---
2
+ name: vulnerability-scanner
3
+ description: Advanced vulnerability analysis principles. OWASP 2025, Supply Chain
4
+ Security, attack surface mapping, risk prioritization.
5
+ allowed-tools: Read, Glob, Grep, Bash
6
+ version: '1.0'
7
+ ---
8
+
9
+ # Vulnerability Scanner
10
+
11
+ > Think like an attacker, defend like an expert. 2025 threat landscape awareness.
12
+
13
+ ## 🔧 Runtime Scripts
14
+
15
+ **Execute for automated validation:**
16
+
17
+ | Script | Purpose | Usage |
18
+ |--------|---------|-------|
19
+ | `scripts/security_scan.py` | Validate security principles applied | `python scripts/security_scan.py <project_path>` |
20
+
21
+ ## 📋 Reference Files
22
+
23
+ | File | Purpose |
24
+ |------|---------|
25
+ | [checklists.md](checklists.md) | OWASP Top 10, Auth, API, Data protection checklists |
26
+
27
+ ---
28
+
29
+ ## 1. Security Expert Mindset
30
+
31
+ ### Core Principles
32
+
33
+ | Principle | Application |
34
+ |-----------|-------------|
35
+ | **Assume Breach** | Design as if attacker already inside |
36
+ | **Zero Trust** | Never trust, always verify |
37
+ | **Defense in Depth** | Multiple layers, no single point |
38
+ | **Least Privilege** | Minimum required access only |
39
+ | **Fail Secure** | On error, deny access |
40
+
41
+ ### Threat Modeling Questions
42
+
43
+ Before scanning, ask:
44
+ 1. What are we protecting? (Assets)
45
+ 2. Who would attack? (Threat actors)
46
+ 3. How would they attack? (Attack vectors)
47
+ 4. What's the impact? (Business risk)
48
+
49
+ ---
50
+
51
+ ## 2. OWASP Top 10:2025
52
+
53
+ ### Risk Categories
54
+
55
+ | Rank | Category | Think About |
56
+ |------|----------|-------------|
57
+ | **A01** | Broken Access Control | Who can access what? IDOR, SSRF |
58
+ | **A02** | Security Misconfiguration | Defaults, headers, exposed services |
59
+ | **A03** | Software Supply Chain 🆕 | Dependencies, CI/CD, build integrity |
60
+ | **A04** | Cryptographic Failures | Weak crypto, exposed secrets |
61
+ | **A05** | Injection | User input system commands |
62
+ | **A06** | Insecure Design | Flawed architecture |
63
+ | **A07** | Authentication Failures | Session, credential management |
64
+ | **A08** | Integrity Failures | Unsigned updates, tampered data |
65
+ | **A09** | Logging & Alerting | Blind spots, no monitoring |
66
+ | **A10** | Exceptional Conditions 🆕 | Error handling, fail-open states |
67
+
68
+ ### 2025 Key Changes
69
+
70
+ ```
71
+ 2021 2025 Shifts:
72
+ ├── SSRF merged into A01 (Access Control)
73
+ ├── A02 elevated (Cloud/Container configs)
74
+ ├── A03 NEW: Supply Chain (major focus)
75
+ ├── A10 NEW: Exceptional Conditions
76
+ └── Focus shift: Root causes > Symptoms
77
+ ```
78
+
79
+ ---
80
+
81
+ ## 3. Supply Chain Security (A03)
82
+
83
+ ### Attack Surface
84
+
85
+ | Vector | Risk | Question to Ask |
86
+ |--------|------|-----------------|
87
+ | **Dependencies** | Malicious packages | Do we audit new deps? |
88
+ | **Lock files** | Integrity attacks | Are they committed? |
89
+ | **Build pipeline** | CI/CD compromise | Who can modify? |
90
+ | **Registry** | Typosquatting | Verified sources? |
91
+
92
+ ### Defense Principles
93
+
94
+ - Verify package integrity (checksums)
95
+ - Pin versions, audit updates
96
+ - Use private registries for critical deps
97
+ - Sign and verify artifacts
98
+
99
+ ---
100
+
101
+ ## 4. Attack Surface Mapping
102
+
103
+ ### What to Map
104
+
105
+ | Category | Elements |
106
+ |----------|----------|
107
+ | **Entry Points** | APIs, forms, file uploads |
108
+ | **Data Flows** | Input Process Output |
109
+ | **Trust Boundaries** | Where auth/authz checked |
110
+ | **Assets** | Secrets, PII, business data |
111
+
112
+ ### Prioritization Matrix
113
+
114
+ ```
115
+ Risk = Likelihood × Impact
116
+
117
+ High Impact + High Likelihood CRITICAL
118
+ High Impact + Low Likelihood HIGH
119
+ Low Impact + High Likelihood → MEDIUM
120
+ Low Impact + Low Likelihood → LOW
121
+ ```
122
+
123
+ ---
124
+
125
+ ## 5. Risk Prioritization
126
+
127
+ ### CVSS + Context
128
+
129
+ | Factor | Weight | Question |
130
+ |--------|--------|----------|
131
+ | **CVSS Score** | Base severity | How severe is the vuln? |
132
+ | **EPSS Score** | Exploit likelihood | Is it being exploited? |
133
+ | **Asset Value** | Business context | What's at risk? |
134
+ | **Exposure** | Attack surface | Internet-facing? |
135
+
136
+ ### Prioritization Decision Tree
137
+
138
+ ```
139
+ Is it actively exploited (EPSS >0.5)?
140
+ ├── YESCRITICAL: Immediate action
141
+ └── NOCheck CVSS
142
+ ├── CVSS ≥9.0 → HIGH
143
+ ├── CVSS 7.0-8.9 → Consider asset value
144
+ └── CVSS <7.0 → Schedule for later
145
+ ```
146
+
147
+ ---
148
+
149
+ ## 6. Exceptional Conditions (A10 - New)
150
+
151
+ ### Fail-Open vs Fail-Closed
152
+
153
+ | Scenario | Fail-Open (BAD) | Fail-Closed (GOOD) |
154
+ |----------|-----------------|---------------------|
155
+ | Auth error | Allow access | Deny access |
156
+ | Parsing fails | Accept input | Reject input |
157
+ | Timeout | Retry forever | Limit + abort |
158
+
159
+ ### What to Check
160
+
161
+ - Exception handlers that catch-all and ignore
162
+ - Missing error handling on security operations
163
+ - Race conditions in auth/authz
164
+ - Resource exhaustion scenarios
165
+
166
+ ---
167
+
168
+ ## 7. Scanning Methodology
169
+
170
+ ### Phase-Based Approach
171
+
172
+ ```
173
+ 1. RECONNAISSANCE
174
+ └── Understand the target
175
+ ├── Technology stack
176
+ ├── Entry points
177
+ └── Data flows
178
+
179
+ 2. DISCOVERY
180
+ └── Identify potential issues
181
+ ├── Configuration review
182
+ ├── Dependency analysis
183
+ └── Code pattern search
184
+
185
+ 3. ANALYSIS
186
+ └── Validate and prioritize
187
+ ├── False positive elimination
188
+ ├── Risk scoring
189
+ └── Attack chain mapping
190
+
191
+ 4. REPORTING
192
+ └── Actionable findings
193
+ ├── Clear reproduction steps
194
+ ├── Business impact
195
+ └── Remediation guidance
196
+ ```
197
+
198
+ ---
199
+
200
+ ## 8. Code Pattern Analysis
201
+
202
+ ### High-Risk Patterns
203
+
204
+ | Pattern | Risk | Look For |
205
+ |---------|------|----------|
206
+ | **String concat in queries** | Injection | `"SELECT * FROM " + user_input` |
207
+ | **Dynamic code execution** | RCE | `eval()`, `exec()`, `Function()` |
208
+ | **Unsafe deserialization** | RCE | `pickle.loads()`, `unserialize()` |
209
+ | **Path manipulation** | Traversal | User input in file paths |
210
+ | **Disabled security** | Various | `verify=False`, `--insecure` |
211
+
212
+ ### Secret Patterns
213
+
214
+ | Type | Indicators |
215
+ |------|-----------|
216
+ | API Keys | `api_key`, `apikey`, high entropy |
217
+ | Tokens | `token`, `bearer`, `jwt` |
218
+ | Credentials | `password`, `secret`, `key` |
219
+ | Cloud | `AWS_`, `AZURE_`, `GCP_` prefixes |
220
+
221
+ ---
222
+
223
+ ## 9. Cloud Security Considerations
224
+
225
+ ### Shared Responsibility
226
+
227
+ | Layer | You Own | Provider Owns |
228
+ |-------|---------|---------------|
229
+ | Data | | |
230
+ | Application | | |
231
+ | OS/Runtime | Depends | Depends |
232
+ | Infrastructure | ❌ | ✅ |
233
+
234
+ ### Cloud-Specific Checks
235
+
236
+ - IAM: Least privilege applied?
237
+ - Storage: Public buckets?
238
+ - Network: Security groups tightened?
239
+ - Secrets: Using secrets manager?
240
+
241
+ ---
242
+
243
+ ## 10. Anti-Patterns
244
+
245
+ | Don't | Do |
246
+ |----------|-------|
247
+ | Scan without understanding | Map attack surface first |
248
+ | Alert on every CVE | Prioritize by exploitability + asset |
249
+ | Ignore false positives | Maintain verified baseline |
250
+ | Fix symptoms only | Address root causes |
251
+ | Scan once before deploy | Continuous scanning |
252
+ | Trust third-party deps blindly | Verify integrity, audit code |
253
+
254
+ ---
255
+
256
+ ## 11. Reporting Principles
257
+
258
+ ### Finding Structure
259
+
260
+ Each finding should answer:
261
+ 1. **What?** - Clear vulnerability description
262
+ 2. **Where?** - Exact location (file, line, endpoint)
263
+ 3. **Why?** - Root cause explanation
264
+ 4. **Impact?** - Business consequence
265
+ 5. **How to fix?** - Specific remediation
266
+
267
+ ### Severity Classification
268
+
269
+ | Severity | Criteria |
270
+ |----------|----------|
271
+ | **Critical** | RCE, auth bypass, mass data exposure |
272
+ | **High** | Data exposure, privilege escalation |
273
+ | **Medium** | Limited scope, requires conditions |
274
+ | **Low** | Informational, best practice |
275
+
276
+ ---
277
+
278
+ > **Remember:** Vulnerability scanning finds issues. Expert thinking prioritizes what matters. Always ask: "What would an attacker do with this?"