scc-universal 1.2.2 → 1.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude-plugin/plugin.json +1 -1
- package/.cursor/agents/sf-agentforce-agent.md +88 -40
- package/.cursor/skills/sf-2gp-security-review/SKILL.md +167 -0
- package/.cursor/skills/sf-agentforce-development/SKILL.md +385 -348
- package/.cursor/skills/sf-cli-reference/SKILL.md +221 -0
- package/.cursor-plugin/plugin.json +1 -1
- package/agents/sf-agentforce-agent.md +88 -40
- package/manifests/install-modules.json +3 -1
- package/package.json +1 -1
- package/skills/_reference/AGENTFORCE_PATTERNS.md +433 -51
- package/skills/_reference/APPEXCHANGE_REVIEW.md +427 -0
- package/skills/_reference/SF_CLI_COMMANDS.md +812 -0
- package/skills/sf-2gp-security-review/SKILL.md +168 -0
- package/skills/sf-agentforce-development/SKILL.md +385 -348
- package/skills/sf-cli-reference/SKILL.md +225 -0
|
@@ -0,0 +1,168 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: sf-2gp-security-review
|
|
3
|
+
description: "Use when user asks for a 2GP security review, AppExchange readiness check, or pass/fail prediction for Apex, LWC, SOQL. Do NOT use for general security patterns."
|
|
4
|
+
origin: SCC
|
|
5
|
+
user-invocable: true
|
|
6
|
+
disable-model-invocation: true
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
# Salesforce 2GP Managed Package Security Review
|
|
10
|
+
|
|
11
|
+
## When to Use
|
|
12
|
+
|
|
13
|
+
- User asks for a 2GP managed package security review or AppExchange readiness assessment
|
|
14
|
+
- User wants a pass/fail prediction for their managed package security review submission
|
|
15
|
+
- User needs a 2GP license qualification checklist or submission readiness scoring
|
|
16
|
+
|
|
17
|
+
This skill performs a comprehensive security review of a Salesforce 2GP managed package,
|
|
18
|
+
assesses readiness for AppExchange security review, and produces a pass/fail prediction
|
|
19
|
+
with actionable remediation steps.
|
|
20
|
+
|
|
21
|
+
## How This Skill Works
|
|
22
|
+
|
|
23
|
+
When invoked, you will:
|
|
24
|
+
|
|
25
|
+
1. **Discover** the package structure (scan for Apex, LWC, objects, permissions, config)
|
|
26
|
+
2. **Audit** every file against the security review criteria below
|
|
27
|
+
3. **Score** each category (PASS / WARN / FAIL)
|
|
28
|
+
4. **Produce** a structured report with an overall pass/fail prediction and remediation plan
|
|
29
|
+
|
|
30
|
+
The output is a detailed markdown report saved to the project's `docs/security/` directory.
|
|
31
|
+
|
|
32
|
+
---
|
|
33
|
+
|
|
34
|
+
## Step 1 — Package Discovery
|
|
35
|
+
|
|
36
|
+
Before auditing, build a complete inventory of the package contents. Run these searches
|
|
37
|
+
against the project's `force-app/` directory:
|
|
38
|
+
|
|
39
|
+
```
|
|
40
|
+
Apex classes: force-app/**/classes/*.cls
|
|
41
|
+
Apex triggers: force-app/**/triggers/*.trigger
|
|
42
|
+
LWC components: force-app/**/lwc/*/
|
|
43
|
+
Aura components: force-app/**/aura/*/
|
|
44
|
+
Visualforce pages: force-app/**/pages/*.page
|
|
45
|
+
Custom objects: force-app/**/objects/*/
|
|
46
|
+
Permission sets: force-app/**/permissionsets/*/
|
|
47
|
+
Custom metadata: force-app/**/customMetadata/*/
|
|
48
|
+
Static resources: force-app/**/staticresources/*/
|
|
49
|
+
Named credentials: force-app/**/namedCredentials/*/
|
|
50
|
+
Remote site settings: force-app/**/remoteSiteSettings/*/
|
|
51
|
+
Connected apps: force-app/**/connectedApps/*/
|
|
52
|
+
```
|
|
53
|
+
|
|
54
|
+
Record the count of each metadata type. This inventory becomes the header of your report.
|
|
55
|
+
|
|
56
|
+
---
|
|
57
|
+
|
|
58
|
+
## Step 2 — Security Audit Categories
|
|
59
|
+
|
|
60
|
+
Audit every file from Step 1 against 15 categories. For each category, assign a status:
|
|
61
|
+
PASS (no issues), WARN (minor issues, unlikely to fail review), or FAIL (will likely
|
|
62
|
+
fail AppExchange security review).
|
|
63
|
+
|
|
64
|
+
Audit criteria, grep patterns, and PASS/WARN/FAIL thresholds for all 15 categories:
|
|
65
|
+
|
|
66
|
+
@../_reference/APPEXCHANGE_REVIEW.md
|
|
67
|
+
|
|
68
|
+
Supporting reference for implementation patterns:
|
|
69
|
+
|
|
70
|
+
- CRUD/FLS, sharing, injection, XSS, Named Credentials: @../_reference/SECURITY_PATTERNS.md
|
|
71
|
+
- Sharing model details: @../_reference/SHARING_MODEL.md
|
|
72
|
+
- Testing standards and annotations: @../_reference/TESTING_STANDARDS.md
|
|
73
|
+
- Namespace, versioning, package CLI: @../_reference/PACKAGE_DEVELOPMENT.md
|
|
74
|
+
- Governor limits and anti-patterns: @../_reference/GOVERNOR_LIMITS.md
|
|
75
|
+
- LWC lifecycle and patterns: @../_reference/LWC_PATTERNS.md
|
|
76
|
+
|
|
77
|
+
**Categories:**
|
|
78
|
+
|
|
79
|
+
1. CRUD/FLS Enforcement (CRITICAL — #1 failure reason)
|
|
80
|
+
2. Sharing Model Enforcement
|
|
81
|
+
3. SOQL/DML Injection Prevention
|
|
82
|
+
4. Sensitive Data Exposure
|
|
83
|
+
5. XSS and Content Security Policy
|
|
84
|
+
6. External Callout Security
|
|
85
|
+
7. Third-Party Library Vulnerabilities
|
|
86
|
+
8. Code Coverage
|
|
87
|
+
9. Namespace and Packaging Compliance
|
|
88
|
+
10. Permission Model
|
|
89
|
+
11. Governor Limit Safety
|
|
90
|
+
12. Lightning Web Security (LWS) Compliance
|
|
91
|
+
13. Connected App and OAuth Configuration
|
|
92
|
+
14. Data at Rest and in Transit
|
|
93
|
+
15. Documentation and Submission Readiness
|
|
94
|
+
|
|
95
|
+
---
|
|
96
|
+
|
|
97
|
+
## Step 3 — 2GP License Qualification Checklist
|
|
98
|
+
|
|
99
|
+
After the security audit, assess readiness for 2GP licensing and AppExchange distribution.
|
|
100
|
+
Check every item and mark as DONE, NOT DONE, or N/A.
|
|
101
|
+
|
|
102
|
+
Full checklist (Dev Hub, package config, code quality, submission, ISV, post-review):
|
|
103
|
+
|
|
104
|
+
@../_reference/APPEXCHANGE_REVIEW.md (section: 2GP License Qualification Checklist)
|
|
105
|
+
|
|
106
|
+
---
|
|
107
|
+
|
|
108
|
+
## Step 4 — Pass/Fail Prediction
|
|
109
|
+
|
|
110
|
+
After completing the audit and checklist, calculate the overall score using the scoring
|
|
111
|
+
rules and produce one of these verdicts: READY TO SUBMIT / NEEDS REMEDIATION / MAJOR
|
|
112
|
+
REWORK NEEDED.
|
|
113
|
+
|
|
114
|
+
Scoring rules and verdict criteria:
|
|
115
|
+
|
|
116
|
+
@../_reference/APPEXCHANGE_REVIEW.md (section: Scoring Rules)
|
|
117
|
+
|
|
118
|
+
---
|
|
119
|
+
|
|
120
|
+
## Step 5 — Report Output
|
|
121
|
+
|
|
122
|
+
Generate a markdown report with this structure and save it to `docs/security/security-review-report.md`:
|
|
123
|
+
|
|
124
|
+
```markdown
|
|
125
|
+
# Security Review Report — [Package Name]
|
|
126
|
+
Generated: [Date]
|
|
127
|
+
Package Version: [version from sfdx-project.json]
|
|
128
|
+
Namespace: [namespace]
|
|
129
|
+
|
|
130
|
+
## Package Inventory
|
|
131
|
+
| Metadata Type | Count |
|
|
132
|
+
|--------------|-------|
|
|
133
|
+
| Apex Classes | X |
|
|
134
|
+
| ... | ... |
|
|
135
|
+
|
|
136
|
+
## Security Audit Results
|
|
137
|
+
### Overall Verdict: [READY TO SUBMIT / NEEDS REMEDIATION / MAJOR REWORK]
|
|
138
|
+
Score: X/15 categories passing
|
|
139
|
+
|
|
140
|
+
### Category Results
|
|
141
|
+
| # | Category | Status | Issues |
|
|
142
|
+
|---|----------|--------|--------|
|
|
143
|
+
| 1 | CRUD/FLS Enforcement | PASS/WARN/FAIL | Details |
|
|
144
|
+
| ... | ... | ... | ... |
|
|
145
|
+
|
|
146
|
+
### Critical Findings (FAIL)
|
|
147
|
+
[List each FAIL with file path, line number, and specific remediation]
|
|
148
|
+
|
|
149
|
+
### Warnings
|
|
150
|
+
[List each WARN with recommendation]
|
|
151
|
+
|
|
152
|
+
## 2GP License Qualification
|
|
153
|
+
[Checklist with DONE/NOT DONE status for each item]
|
|
154
|
+
|
|
155
|
+
## Remediation Plan
|
|
156
|
+
[Prioritized list of fixes, ordered by: automatic fails first, then likely fails, then warnings]
|
|
157
|
+
|
|
158
|
+
## Appendix: Scanner Commands
|
|
159
|
+
[Commands the user should run for Code Analyzer, Checkmarx, etc.]
|
|
160
|
+
```
|
|
161
|
+
|
|
162
|
+
---
|
|
163
|
+
|
|
164
|
+
## Related
|
|
165
|
+
|
|
166
|
+
- Scanner commands: @../_reference/APPEXCHANGE_REVIEW.md (section: Scanner Commands)
|
|
167
|
+
- Top 20 failures: @../_reference/APPEXCHANGE_REVIEW.md (section: Top 20 Failures)
|
|
168
|
+
- 2026 platform changes: @../_reference/APPEXCHANGE_REVIEW.md (section: 2026 Considerations)
|