scc-universal 1.2.2 → 1.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,168 @@
1
+ ---
2
+ name: sf-2gp-security-review
3
+ description: "Use when user asks for a 2GP security review, AppExchange readiness check, or pass/fail prediction for Apex, LWC, SOQL. Do NOT use for general security patterns."
4
+ origin: SCC
5
+ user-invocable: true
6
+ disable-model-invocation: true
7
+ ---
8
+
9
+ # Salesforce 2GP Managed Package Security Review
10
+
11
+ ## When to Use
12
+
13
+ - User asks for a 2GP managed package security review or AppExchange readiness assessment
14
+ - User wants a pass/fail prediction for their managed package security review submission
15
+ - User needs a 2GP license qualification checklist or submission readiness scoring
16
+
17
+ This skill performs a comprehensive security review of a Salesforce 2GP managed package,
18
+ assesses readiness for AppExchange security review, and produces a pass/fail prediction
19
+ with actionable remediation steps.
20
+
21
+ ## How This Skill Works
22
+
23
+ When invoked, you will:
24
+
25
+ 1. **Discover** the package structure (scan for Apex, LWC, objects, permissions, config)
26
+ 2. **Audit** every file against the security review criteria below
27
+ 3. **Score** each category (PASS / WARN / FAIL)
28
+ 4. **Produce** a structured report with an overall pass/fail prediction and remediation plan
29
+
30
+ The output is a detailed markdown report saved to the project's `docs/security/` directory.
31
+
32
+ ---
33
+
34
+ ## Step 1 — Package Discovery
35
+
36
+ Before auditing, build a complete inventory of the package contents. Run these searches
37
+ against the project's `force-app/` directory:
38
+
39
+ ```
40
+ Apex classes: force-app/**/classes/*.cls
41
+ Apex triggers: force-app/**/triggers/*.trigger
42
+ LWC components: force-app/**/lwc/*/
43
+ Aura components: force-app/**/aura/*/
44
+ Visualforce pages: force-app/**/pages/*.page
45
+ Custom objects: force-app/**/objects/*/
46
+ Permission sets: force-app/**/permissionsets/*/
47
+ Custom metadata: force-app/**/customMetadata/*/
48
+ Static resources: force-app/**/staticresources/*/
49
+ Named credentials: force-app/**/namedCredentials/*/
50
+ Remote site settings: force-app/**/remoteSiteSettings/*/
51
+ Connected apps: force-app/**/connectedApps/*/
52
+ ```
53
+
54
+ Record the count of each metadata type. This inventory becomes the header of your report.
55
+
56
+ ---
57
+
58
+ ## Step 2 — Security Audit Categories
59
+
60
+ Audit every file from Step 1 against 15 categories. For each category, assign a status:
61
+ PASS (no issues), WARN (minor issues, unlikely to fail review), or FAIL (will likely
62
+ fail AppExchange security review).
63
+
64
+ Audit criteria, grep patterns, and PASS/WARN/FAIL thresholds for all 15 categories:
65
+
66
+ @../_reference/APPEXCHANGE_REVIEW.md
67
+
68
+ Supporting reference for implementation patterns:
69
+
70
+ - CRUD/FLS, sharing, injection, XSS, Named Credentials: @../_reference/SECURITY_PATTERNS.md
71
+ - Sharing model details: @../_reference/SHARING_MODEL.md
72
+ - Testing standards and annotations: @../_reference/TESTING_STANDARDS.md
73
+ - Namespace, versioning, package CLI: @../_reference/PACKAGE_DEVELOPMENT.md
74
+ - Governor limits and anti-patterns: @../_reference/GOVERNOR_LIMITS.md
75
+ - LWC lifecycle and patterns: @../_reference/LWC_PATTERNS.md
76
+
77
+ **Categories:**
78
+
79
+ 1. CRUD/FLS Enforcement (CRITICAL — #1 failure reason)
80
+ 2. Sharing Model Enforcement
81
+ 3. SOQL/DML Injection Prevention
82
+ 4. Sensitive Data Exposure
83
+ 5. XSS and Content Security Policy
84
+ 6. External Callout Security
85
+ 7. Third-Party Library Vulnerabilities
86
+ 8. Code Coverage
87
+ 9. Namespace and Packaging Compliance
88
+ 10. Permission Model
89
+ 11. Governor Limit Safety
90
+ 12. Lightning Web Security (LWS) Compliance
91
+ 13. Connected App and OAuth Configuration
92
+ 14. Data at Rest and in Transit
93
+ 15. Documentation and Submission Readiness
94
+
95
+ ---
96
+
97
+ ## Step 3 — 2GP License Qualification Checklist
98
+
99
+ After the security audit, assess readiness for 2GP licensing and AppExchange distribution.
100
+ Check every item and mark as DONE, NOT DONE, or N/A.
101
+
102
+ Full checklist (Dev Hub, package config, code quality, submission, ISV, post-review):
103
+
104
+ @../_reference/APPEXCHANGE_REVIEW.md (section: 2GP License Qualification Checklist)
105
+
106
+ ---
107
+
108
+ ## Step 4 — Pass/Fail Prediction
109
+
110
+ After completing the audit and checklist, calculate the overall score using the scoring
111
+ rules and produce one of these verdicts: READY TO SUBMIT / NEEDS REMEDIATION / MAJOR
112
+ REWORK NEEDED.
113
+
114
+ Scoring rules and verdict criteria:
115
+
116
+ @../_reference/APPEXCHANGE_REVIEW.md (section: Scoring Rules)
117
+
118
+ ---
119
+
120
+ ## Step 5 — Report Output
121
+
122
+ Generate a markdown report with this structure and save it to `docs/security/security-review-report.md`:
123
+
124
+ ```markdown
125
+ # Security Review Report — [Package Name]
126
+ Generated: [Date]
127
+ Package Version: [version from sfdx-project.json]
128
+ Namespace: [namespace]
129
+
130
+ ## Package Inventory
131
+ | Metadata Type | Count |
132
+ |--------------|-------|
133
+ | Apex Classes | X |
134
+ | ... | ... |
135
+
136
+ ## Security Audit Results
137
+ ### Overall Verdict: [READY TO SUBMIT / NEEDS REMEDIATION / MAJOR REWORK]
138
+ Score: X/15 categories passing
139
+
140
+ ### Category Results
141
+ | # | Category | Status | Issues |
142
+ |---|----------|--------|--------|
143
+ | 1 | CRUD/FLS Enforcement | PASS/WARN/FAIL | Details |
144
+ | ... | ... | ... | ... |
145
+
146
+ ### Critical Findings (FAIL)
147
+ [List each FAIL with file path, line number, and specific remediation]
148
+
149
+ ### Warnings
150
+ [List each WARN with recommendation]
151
+
152
+ ## 2GP License Qualification
153
+ [Checklist with DONE/NOT DONE status for each item]
154
+
155
+ ## Remediation Plan
156
+ [Prioritized list of fixes, ordered by: automatic fails first, then likely fails, then warnings]
157
+
158
+ ## Appendix: Scanner Commands
159
+ [Commands the user should run for Code Analyzer, Checkmarx, etc.]
160
+ ```
161
+
162
+ ---
163
+
164
+ ## Related
165
+
166
+ - Scanner commands: @../_reference/APPEXCHANGE_REVIEW.md (section: Scanner Commands)
167
+ - Top 20 failures: @../_reference/APPEXCHANGE_REVIEW.md (section: Top 20 Failures)
168
+ - 2026 platform changes: @../_reference/APPEXCHANGE_REVIEW.md (section: 2026 Considerations)