start-vibing 2.0.9 → 2.0.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (139) hide show
  1. package/README.md +177 -176
  2. package/dist/cli.js +38 -11
  3. package/package.json +42 -42
  4. package/template/.claude/CLAUDE.md +174 -172
  5. package/template/.claude/agents/01-orchestration/agent-selector.md +130 -123
  6. package/template/.claude/agents/01-orchestration/checkpoint-manager.md +142 -131
  7. package/template/.claude/agents/01-orchestration/context-manager.md +138 -124
  8. package/template/.claude/agents/01-orchestration/error-recovery.md +182 -176
  9. package/template/.claude/agents/01-orchestration/orchestrator.md +114 -107
  10. package/template/.claude/agents/01-orchestration/parallel-coordinator.md +141 -130
  11. package/template/.claude/agents/01-orchestration/task-decomposer.md +121 -118
  12. package/template/.claude/agents/01-orchestration/workflow-router.md +114 -111
  13. package/template/.claude/agents/02-typescript/bun-runtime-expert.md +197 -180
  14. package/template/.claude/agents/02-typescript/esm-resolver.md +193 -187
  15. package/template/.claude/agents/02-typescript/import-alias-enforcer.md +158 -149
  16. package/template/.claude/agents/02-typescript/ts-generics-helper.md +183 -165
  17. package/template/.claude/agents/02-typescript/ts-migration-helper.md +238 -227
  18. package/template/.claude/agents/02-typescript/ts-strict-checker.md +180 -162
  19. package/template/.claude/agents/02-typescript/ts-types-analyzer.md +199 -185
  20. package/template/.claude/agents/02-typescript/type-definition-writer.md +187 -183
  21. package/template/.claude/agents/02-typescript/zod-schema-designer.md +212 -197
  22. package/template/.claude/agents/02-typescript/zod-validator.md +158 -153
  23. package/template/.claude/agents/03-testing/playwright-assertions.md +265 -255
  24. package/template/.claude/agents/03-testing/playwright-e2e.md +247 -245
  25. package/template/.claude/agents/03-testing/playwright-fixtures.md +234 -240
  26. package/template/.claude/agents/03-testing/playwright-multi-viewport.md +256 -261
  27. package/template/.claude/agents/03-testing/playwright-page-objects.md +247 -247
  28. package/template/.claude/agents/03-testing/test-cleanup-manager.md +248 -256
  29. package/template/.claude/agents/03-testing/test-data-generator.md +254 -266
  30. package/template/.claude/agents/03-testing/tester-integration.md +278 -278
  31. package/template/.claude/agents/03-testing/tester-unit.md +207 -204
  32. package/template/.claude/agents/03-testing/vitest-config.md +287 -289
  33. package/template/.claude/agents/04-docker/container-health.md +255 -239
  34. package/template/.claude/agents/04-docker/deployment-validator.md +225 -217
  35. package/template/.claude/agents/04-docker/docker-compose-designer.md +281 -268
  36. package/template/.claude/agents/04-docker/docker-env-manager.md +235 -228
  37. package/template/.claude/agents/04-docker/docker-multi-stage.md +241 -229
  38. package/template/.claude/agents/04-docker/dockerfile-optimizer.md +208 -204
  39. package/template/.claude/agents/05-database/data-migration.md +0 -293
  40. package/template/.claude/agents/05-database/database-seeder.md +273 -270
  41. package/template/.claude/agents/05-database/mongodb-query-optimizer.md +230 -219
  42. package/template/.claude/agents/05-database/mongoose-aggregation.md +306 -280
  43. package/template/.claude/agents/05-database/mongoose-index-optimizer.md +182 -174
  44. package/template/.claude/agents/05-database/mongoose-schema-designer.md +267 -267
  45. package/template/.claude/agents/06-security/auth-session-validator.md +68 -65
  46. package/template/.claude/agents/06-security/input-sanitizer.md +80 -81
  47. package/template/.claude/agents/06-security/owasp-checker.md +97 -87
  48. package/template/.claude/agents/06-security/permission-auditor.md +100 -95
  49. package/template/.claude/agents/06-security/security-auditor.md +84 -82
  50. package/template/.claude/agents/06-security/sensitive-data-scanner.md +83 -85
  51. package/template/.claude/agents/07-documentation/api-documenter.md +136 -131
  52. package/template/.claude/agents/07-documentation/changelog-manager.md +105 -96
  53. package/template/.claude/agents/07-documentation/documenter.md +76 -73
  54. package/template/.claude/agents/07-documentation/domain-updater.md +81 -74
  55. package/template/.claude/agents/07-documentation/jsdoc-generator.md +114 -114
  56. package/template/.claude/agents/07-documentation/readme-generator.md +135 -132
  57. package/template/.claude/agents/08-git/branch-manager.md +58 -58
  58. package/template/.claude/agents/08-git/commit-manager.md +63 -61
  59. package/template/.claude/agents/08-git/pr-creator.md +76 -72
  60. package/template/.claude/agents/09-quality/code-reviewer.md +71 -64
  61. package/template/.claude/agents/09-quality/quality-checker.md +67 -67
  62. package/template/.claude/agents/10-research/best-practices-finder.md +89 -82
  63. package/template/.claude/agents/10-research/competitor-analyzer.md +106 -96
  64. package/template/.claude/agents/10-research/pattern-researcher.md +93 -86
  65. package/template/.claude/agents/10-research/research-cache-manager.md +76 -75
  66. package/template/.claude/agents/10-research/research-web.md +98 -91
  67. package/template/.claude/agents/10-research/tech-evaluator.md +101 -94
  68. package/template/.claude/agents/11-ui-ux/accessibility-auditor.md +136 -128
  69. package/template/.claude/agents/11-ui-ux/design-system-enforcer.md +125 -116
  70. package/template/.claude/agents/11-ui-ux/skeleton-generator.md +118 -120
  71. package/template/.claude/agents/11-ui-ux/ui-desktop.md +132 -126
  72. package/template/.claude/agents/11-ui-ux/ui-mobile.md +98 -94
  73. package/template/.claude/agents/11-ui-ux/ui-tablet.md +110 -111
  74. package/template/.claude/agents/12-performance/api-latency-analyzer.md +156 -149
  75. package/template/.claude/agents/12-performance/bundle-analyzer.md +113 -107
  76. package/template/.claude/agents/12-performance/memory-leak-detector.md +137 -126
  77. package/template/.claude/agents/12-performance/performance-profiler.md +115 -108
  78. package/template/.claude/agents/12-performance/query-optimizer.md +124 -116
  79. package/template/.claude/agents/12-performance/render-optimizer.md +154 -148
  80. package/template/.claude/agents/13-debugging/build-error-fixer.md +207 -188
  81. package/template/.claude/agents/13-debugging/debugger.md +149 -137
  82. package/template/.claude/agents/13-debugging/error-stack-analyzer.md +141 -131
  83. package/template/.claude/agents/13-debugging/network-debugger.md +208 -185
  84. package/template/.claude/agents/13-debugging/runtime-error-fixer.md +181 -173
  85. package/template/.claude/agents/13-debugging/type-error-resolver.md +185 -173
  86. package/template/.claude/agents/14-validation/final-validator.md +93 -83
  87. package/template/.claude/agents/_backup/analyzer.md +134 -125
  88. package/template/.claude/agents/_backup/code-reviewer.md +279 -272
  89. package/template/.claude/agents/_backup/commit-manager.md +219 -212
  90. package/template/.claude/agents/_backup/debugger.md +280 -271
  91. package/template/.claude/agents/_backup/documenter.md +237 -220
  92. package/template/.claude/agents/_backup/domain-updater.md +197 -194
  93. package/template/.claude/agents/_backup/final-validator.md +169 -164
  94. package/template/.claude/agents/_backup/orchestrator.md +149 -138
  95. package/template/.claude/agents/_backup/performance.md +232 -228
  96. package/template/.claude/agents/_backup/quality-checker.md +240 -240
  97. package/template/.claude/agents/_backup/research.md +315 -299
  98. package/template/.claude/agents/_backup/security-auditor.md +192 -186
  99. package/template/.claude/agents/_backup/tester.md +566 -564
  100. package/template/.claude/agents/_backup/ui-ux-reviewer.md +247 -242
  101. package/template/.claude/commands/feature.md +48 -48
  102. package/template/.claude/config/README.md +30 -30
  103. package/template/.claude/config/mcp-config.json +344 -330
  104. package/template/.claude/config/project-config.json +53 -53
  105. package/template/.claude/config/quality-gates.json +46 -46
  106. package/template/.claude/config/security-rules.json +45 -45
  107. package/template/.claude/config/testing-config.json +164 -168
  108. package/template/.claude/hooks/SETUP.md +126 -126
  109. package/template/.claude/hooks/run-hook.ts +176 -172
  110. package/template/.claude/hooks/stop-validator.ts +824 -772
  111. package/template/.claude/hooks/user-prompt-submit.ts +886 -823
  112. package/template/.claude/scripts/mcp-quick-install.ts +151 -151
  113. package/template/.claude/scripts/setup-mcps.ts +651 -628
  114. package/template/.claude/settings.json +275 -276
  115. package/template/.claude/skills/bun-runtime/SKILL.md +430 -430
  116. package/template/.claude/skills/codebase-knowledge/SKILL.md +145 -145
  117. package/template/.claude/skills/codebase-knowledge/domains/claude-system.md +431 -403
  118. package/template/.claude/skills/codebase-knowledge/domains/mcp-integration.md +295 -281
  119. package/template/.claude/skills/debugging-patterns/SKILL.md +485 -484
  120. package/template/.claude/skills/docker-patterns/SKILL.md +555 -547
  121. package/template/.claude/skills/docs-tracker/SKILL.md +239 -239
  122. package/template/.claude/skills/final-check/SKILL.md +284 -284
  123. package/template/.claude/skills/git-workflow/SKILL.md +454 -454
  124. package/template/.claude/skills/mongoose-patterns/SKILL.md +499 -512
  125. package/template/.claude/skills/nextjs-app-router/SKILL.md +327 -337
  126. package/template/.claude/skills/performance-patterns/SKILL.md +547 -549
  127. package/template/.claude/skills/playwright-automation/SKILL.md +438 -438
  128. package/template/.claude/skills/quality-gate/SKILL.md +294 -294
  129. package/template/.claude/skills/react-patterns/SKILL.md +389 -376
  130. package/template/.claude/skills/research-cache/SKILL.md +222 -207
  131. package/template/.claude/skills/security-scan/SKILL.md +222 -222
  132. package/template/.claude/skills/shadcn-ui/SKILL.md +511 -520
  133. package/template/.claude/skills/tailwind-patterns/SKILL.md +465 -467
  134. package/template/.claude/skills/test-coverage/SKILL.md +467 -464
  135. package/template/.claude/skills/trpc-api/SKILL.md +434 -435
  136. package/template/.claude/skills/typescript-strict/SKILL.md +367 -368
  137. package/template/.claude/skills/ui-ux-audit/SKILL.md +254 -254
  138. package/template/.claude/skills/zod-validation/SKILL.md +403 -405
  139. package/template/CLAUDE.md +25 -25
@@ -1,222 +1,222 @@
1
- ---
2
- name: security-scan
3
- description: Audits code security against OWASP Top 10. Validates user ID from session, detects sensitive data leaks, verifies Zod validation. HAS VETO POWER - blocks insecure code.
4
- allowed-tools: Read, Grep, Glob, Bash
5
- ---
6
-
7
- # Security Scan - Security Audit System
8
-
9
- ## VETO POWER
10
-
11
- > **WARNING:** This skill HAS VETO POWER.
12
- > If critical vulnerability detected, MUST:
13
- >
14
- > 1. STOP implementation
15
- > 2. REPORT vulnerability
16
- > 3. REQUIRE fix before proceeding
17
-
18
- ---
19
-
20
- ## Purpose
21
-
22
- This skill audits code security:
23
-
24
- - **Validates** user ID comes from session (NEVER from request)
25
- - **Detects** sensitive data being sent to frontend
26
- - **Verifies** Zod validation on all routes
27
- - **Audits** against OWASP Top 10
28
- - **Blocks** commits with critical vulnerabilities
29
-
30
- ---
31
-
32
- ## Critical Security Rules
33
-
34
- ### 1. USER ID ALWAYS FROM SESSION
35
-
36
- > **NEVER** trust user ID from frontend.
37
- > **ALWAYS** extract from `ctx.session.userId` or `ctx.user._id`.
38
-
39
- ```typescript
40
- // WRONG - VULNERABLE (IMMEDIATE VETO)
41
- async function getData({ userId }: { userId: string }) {
42
- return db.find({ userId }); // userId can be manipulated!
43
- }
44
-
45
- // CORRECT
46
- async function getData({ ctx }: { ctx: Context }) {
47
- const userId = ctx.user._id; // Always from session
48
- return db.find({ userId });
49
- }
50
- ```
51
-
52
- ### 2. SENSITIVE DATA NEVER TO FRONTEND
53
-
54
- > **NEVER** send to frontend:
55
- >
56
- > - Passwords (even hashed)
57
- > - API tokens
58
- > - Secret keys
59
- > - Other users' data
60
- > - Stack traces in production
61
-
62
- ```typescript
63
- // WRONG - DATA LEAK (IMMEDIATE VETO)
64
- return {
65
- user: await UserModel.findById(id), // Includes passwordHash!
66
- };
67
-
68
- // CORRECT
69
- return {
70
- user: user.toPublic(), // Sanitization method
71
- };
72
- ```
73
-
74
- ### 3. ZOD VALIDATION REQUIRED
75
-
76
- > **EVERY** tRPC route MUST have `.input(z.object({...}))`.
77
- > Unvalidated inputs are attack vectors.
78
-
79
- ```typescript
80
- // WRONG - NO VALIDATION (IMMEDIATE VETO)
81
- .mutation(async ({ input }) => {
82
- await db.create(input); // input can have anything!
83
- })
84
-
85
- // CORRECT
86
- .input(createSchema) // Zod schema
87
- .mutation(async ({ input }) => {
88
- await db.create(input); // input is validated
89
- })
90
- ```
91
-
92
- ---
93
-
94
- ## OWASP Top 10 Checklist
95
-
96
- ### A01: Broken Access Control
97
-
98
- - [ ] All protected routes use `protectedProcedure`?
99
- - [ ] User ID from session, not input?
100
- - [ ] Resources filtered by user/tenant?
101
-
102
- ### A02: Cryptographic Failures
103
-
104
- - [ ] Passwords hashed with bcrypt (salt >= 10)?
105
- - [ ] Tokens generated with crypto.randomBytes?
106
- - [ ] Cookies with HttpOnly, Secure, SameSite?
107
- - [ ] No secrets in code (use env vars)?
108
-
109
- ### A03: Injection
110
-
111
- - [ ] Queries use Mongoose (prevents NoSQL injection)?
112
- - [ ] Inputs validated with Zod?
113
- - [ ] No string concatenation in queries?
114
-
115
- ### A07: Authentication Failures
116
-
117
- - [ ] Passwords with minimum requirements?
118
- - [ ] Brute force protection?
119
- - [ ] Sessions invalidated on logout?
120
- - [ ] Tokens with expiration?
121
-
122
- ---
123
-
124
- ## Detection Patterns
125
-
126
- ### Detect User ID from Input (VETO)
127
-
128
- ```bash
129
- grep -r "input\.userId\|input\.user_id\|{ userId }" server/ --include="*.ts"
130
- ```
131
-
132
- ### Detect Password Return (VETO)
133
-
134
- ```bash
135
- grep -r "passwordHash\|password:" server/ --include="*.ts"
136
- ```
137
-
138
- ### Detect Route Without Validation (VETO)
139
-
140
- ```bash
141
- grep -A5 "Procedure\." server/ --include="*.ts" | grep -v ".input("
142
- ```
143
-
144
- ---
145
-
146
- ## Output Format
147
-
148
- ### Approved
149
-
150
- ```markdown
151
- ## SECURITY SCAN - APPROVED
152
-
153
- ### Scope
154
-
155
- - **Files:** X
156
- - **Routes:** Y
157
-
158
- ### Checks
159
-
160
- - [x] User ID always from session
161
- - [x] No sensitive data in response
162
- - [x] All routes with Zod validation
163
- - [x] OWASP Top 10 OK
164
-
165
- **STATUS: APPROVED**
166
- ```
167
-
168
- ### Vetoed
169
-
170
- ```markdown
171
- ## SECURITY SCAN - VETOED
172
-
173
- ### CRITICAL VULNERABILITY
174
-
175
- **Type:** User ID from Input
176
- **File:** `server/routers/example.ts:45`
177
- **Risk:** Any user can access other users' data
178
-
179
- **Fix:** Use `ctx.user._id` instead of `input.userId`
180
-
181
- **STATUS: VETOED** - Fix before proceeding
182
- ```
183
-
184
- ---
185
-
186
- ## VETO Rules
187
-
188
- ### IMMEDIATE VETO
189
-
190
- 1. User ID from input/request body
191
- 2. Password returned in response
192
- 3. API tokens exposed
193
- 4. Protected route without `protectedProcedure`
194
- 5. Query without user/tenant filter
195
-
196
- ### VETO BEFORE MERGE
197
-
198
- 1. Route without Zod validation
199
- 2. Unsanitized sensitive data
200
- 3. bun audit (or npm audit) with critical vulnerabilities
201
-
202
- ---
203
-
204
- ## Progressive Disclosure
205
-
206
- For detailed information, see:
207
-
208
- - **[reference/owasp-top-10.md](reference/owasp-top-10.md)** - Complete OWASP Top 10 checklist with examples
209
- - **[scripts/scan.py](scripts/scan.py)** - Automated security scanner
210
-
211
- ### Quick Scan
212
-
213
- ```bash
214
- python .claude/skills/security-scan/scripts/scan.py server/
215
- ```
216
-
217
- ---
218
-
219
- ## Version
220
-
221
- - **v2.1.0** - Added progressive disclosure with reference files and scan script
222
- - **v2.0.0** - Generic template
1
+ ---
2
+ name: security-scan
3
+ description: Audits code security against OWASP Top 10. Validates user ID from session, detects sensitive data leaks, verifies Zod validation. HAS VETO POWER - blocks insecure code.
4
+ allowed-tools: Read, Grep, Glob, Bash
5
+ ---
6
+
7
+ # Security Scan - Security Audit System
8
+
9
+ ## VETO POWER
10
+
11
+ > **WARNING:** This skill HAS VETO POWER.
12
+ > If critical vulnerability detected, MUST:
13
+ >
14
+ > 1. STOP implementation
15
+ > 2. REPORT vulnerability
16
+ > 3. REQUIRE fix before proceeding
17
+
18
+ ---
19
+
20
+ ## Purpose
21
+
22
+ This skill audits code security:
23
+
24
+ - **Validates** user ID comes from session (NEVER from request)
25
+ - **Detects** sensitive data being sent to frontend
26
+ - **Verifies** Zod validation on all routes
27
+ - **Audits** against OWASP Top 10
28
+ - **Blocks** commits with critical vulnerabilities
29
+
30
+ ---
31
+
32
+ ## Critical Security Rules
33
+
34
+ ### 1. USER ID ALWAYS FROM SESSION
35
+
36
+ > **NEVER** trust user ID from frontend.
37
+ > **ALWAYS** extract from `ctx.session.userId` or `ctx.user._id`.
38
+
39
+ ```typescript
40
+ // WRONG - VULNERABLE (IMMEDIATE VETO)
41
+ async function getData({ userId }: { userId: string }) {
42
+ return db.find({ userId }); // userId can be manipulated!
43
+ }
44
+
45
+ // CORRECT
46
+ async function getData({ ctx }: { ctx: Context }) {
47
+ const userId = ctx.user._id; // Always from session
48
+ return db.find({ userId });
49
+ }
50
+ ```
51
+
52
+ ### 2. SENSITIVE DATA NEVER TO FRONTEND
53
+
54
+ > **NEVER** send to frontend:
55
+ >
56
+ > - Passwords (even hashed)
57
+ > - API tokens
58
+ > - Secret keys
59
+ > - Other users' data
60
+ > - Stack traces in production
61
+
62
+ ```typescript
63
+ // WRONG - DATA LEAK (IMMEDIATE VETO)
64
+ return {
65
+ user: await UserModel.findById(id), // Includes passwordHash!
66
+ };
67
+
68
+ // CORRECT
69
+ return {
70
+ user: user.toPublic(), // Sanitization method
71
+ };
72
+ ```
73
+
74
+ ### 3. ZOD VALIDATION REQUIRED
75
+
76
+ > **EVERY** tRPC route MUST have `.input(z.object({...}))`.
77
+ > Unvalidated inputs are attack vectors.
78
+
79
+ ```typescript
80
+ // WRONG - NO VALIDATION (IMMEDIATE VETO)
81
+ .mutation(async ({ input }) => {
82
+ await db.create(input); // input can have anything!
83
+ })
84
+
85
+ // CORRECT
86
+ .input(createSchema) // Zod schema
87
+ .mutation(async ({ input }) => {
88
+ await db.create(input); // input is validated
89
+ })
90
+ ```
91
+
92
+ ---
93
+
94
+ ## OWASP Top 10 Checklist
95
+
96
+ ### A01: Broken Access Control
97
+
98
+ - [ ] All protected routes use `protectedProcedure`?
99
+ - [ ] User ID from session, not input?
100
+ - [ ] Resources filtered by user/tenant?
101
+
102
+ ### A02: Cryptographic Failures
103
+
104
+ - [ ] Passwords hashed with bcrypt (salt >= 10)?
105
+ - [ ] Tokens generated with crypto.randomBytes?
106
+ - [ ] Cookies with HttpOnly, Secure, SameSite?
107
+ - [ ] No secrets in code (use env vars)?
108
+
109
+ ### A03: Injection
110
+
111
+ - [ ] Queries use Mongoose (prevents NoSQL injection)?
112
+ - [ ] Inputs validated with Zod?
113
+ - [ ] No string concatenation in queries?
114
+
115
+ ### A07: Authentication Failures
116
+
117
+ - [ ] Passwords with minimum requirements?
118
+ - [ ] Brute force protection?
119
+ - [ ] Sessions invalidated on logout?
120
+ - [ ] Tokens with expiration?
121
+
122
+ ---
123
+
124
+ ## Detection Patterns
125
+
126
+ ### Detect User ID from Input (VETO)
127
+
128
+ ```bash
129
+ grep -r "input\.userId\|input\.user_id\|{ userId }" server/ --include="*.ts"
130
+ ```
131
+
132
+ ### Detect Password Return (VETO)
133
+
134
+ ```bash
135
+ grep -r "passwordHash\|password:" server/ --include="*.ts"
136
+ ```
137
+
138
+ ### Detect Route Without Validation (VETO)
139
+
140
+ ```bash
141
+ grep -A5 "Procedure\." server/ --include="*.ts" | grep -v ".input("
142
+ ```
143
+
144
+ ---
145
+
146
+ ## Output Format
147
+
148
+ ### Approved
149
+
150
+ ```markdown
151
+ ## SECURITY SCAN - APPROVED
152
+
153
+ ### Scope
154
+
155
+ - **Files:** X
156
+ - **Routes:** Y
157
+
158
+ ### Checks
159
+
160
+ - [x] User ID always from session
161
+ - [x] No sensitive data in response
162
+ - [x] All routes with Zod validation
163
+ - [x] OWASP Top 10 OK
164
+
165
+ **STATUS: APPROVED**
166
+ ```
167
+
168
+ ### Vetoed
169
+
170
+ ```markdown
171
+ ## SECURITY SCAN - VETOED
172
+
173
+ ### CRITICAL VULNERABILITY
174
+
175
+ **Type:** User ID from Input
176
+ **File:** `server/routers/example.ts:45`
177
+ **Risk:** Any user can access other users' data
178
+
179
+ **Fix:** Use `ctx.user._id` instead of `input.userId`
180
+
181
+ **STATUS: VETOED** - Fix before proceeding
182
+ ```
183
+
184
+ ---
185
+
186
+ ## VETO Rules
187
+
188
+ ### IMMEDIATE VETO
189
+
190
+ 1. User ID from input/request body
191
+ 2. Password returned in response
192
+ 3. API tokens exposed
193
+ 4. Protected route without `protectedProcedure`
194
+ 5. Query without user/tenant filter
195
+
196
+ ### VETO BEFORE MERGE
197
+
198
+ 1. Route without Zod validation
199
+ 2. Unsanitized sensitive data
200
+ 3. bun audit (or npm audit) with critical vulnerabilities
201
+
202
+ ---
203
+
204
+ ## Progressive Disclosure
205
+
206
+ For detailed information, see:
207
+
208
+ - **[reference/owasp-top-10.md](reference/owasp-top-10.md)** - Complete OWASP Top 10 checklist with examples
209
+ - **[scripts/scan.py](scripts/scan.py)** - Automated security scanner
210
+
211
+ ### Quick Scan
212
+
213
+ ```bash
214
+ python .claude/skills/security-scan/scripts/scan.py server/
215
+ ```
216
+
217
+ ---
218
+
219
+ ## Version
220
+
221
+ - **v2.1.0** - Added progressive disclosure with reference files and scan script
222
+ - **v2.0.0** - Generic template