security-essentials
Security best practices, OWASP compliance, authentication patterns, and vulnerability prevention
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Install command
npx @skill-hub/cli install primadetaautomation-primadata-marketplace-security-essentials
Repository
Skill path: .claude/skills/security-essentials
Security best practices, OWASP compliance, authentication patterns, and vulnerability prevention
Open repositoryBest for
Primary workflow: Run DevOps.
Technical facets: Full Stack, Security.
Target audience: everyone.
License: Unknown.
Original source
Catalog source: SkillHub Club.
Repository owner: Primadetaautomation.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install security-essentials into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/Primadetaautomation/primadata-marketplace before adding security-essentials to shared team environments
- Use security-essentials for development workflows
Works across
Favorites: 0.
Sub-skills: 0.
Aggregator: No.
Original source / Raw SKILL.md
---
name: security-essentials
description: Security best practices, OWASP compliance, authentication patterns, and vulnerability prevention
triggers: [security, auth, authentication, authorization, OWASP, vulnerability, encryption, secure, XSS, CSRF, SQL injection]
version: 1.0.0
agents: [security-specialist, senior-fullstack-developer, qa-testing-engineer]
context_levels:
minimal: Critical security rules and quick checklist
detailed: OWASP Top 10 and implementation patterns
full: Security scanning scripts and remediation guides
---
# Security Essentials Skill
## Overview
This skill provides comprehensive security guidance following OWASP standards and industry best practices. It ensures secure code development and vulnerability prevention.
## When to Use This Skill
- Implementing authentication/authorization
- Handling sensitive user data
- Security reviews before production
- API security hardening
- Compliance requirements (GDPR, SOC2)
- Vulnerability remediation
## Critical Security Rules (Level 1 - Always Loaded)
### π΄ MUST Requirements
**SEC-1: Input Validation (CRITICAL)**
```typescript
// β
GOOD - Validate at boundaries
import { z } from 'zod';
const userSchema = z.object({
email: z.string().email().max(255),
password: z.string().min(8).max(128),
name: z.string().min(1).max(100).regex(/^[a-zA-Z\s]+$/),
});
function createUser(input: unknown) {
// Validation happens at system boundary
const validated = userSchema.parse(input);
return userService.create(validated);
}
// β BAD - No validation
function createUser(input: any) {
return userService.create(input); // Unsafe!
}
```
**SEC-2: Output Sanitization (CRITICAL)**
```typescript
import DOMPurify from 'isomorphic-dompurify';
// β
GOOD - Sanitize before rendering
function displayUserContent(html: string) {
const clean = DOMPurify.sanitize(html, {
ALLOWED_TAGS: ['p', 'br', 'strong', 'em'],
ALLOWED_ATTR: []
});
return <div dangerouslySetInnerHTML={{ __html: clean }} />;
}
// β BAD - XSS vulnerability
function displayUserContent(html: string) {
return <div dangerouslySetInnerHTML={{ __html: html }} />; // XSS!
}
```
**SEC-3: Secrets Management (CRITICAL)**
```typescript
// β
GOOD - Environment variables
const config = {
apiKey: process.env.API_KEY,
dbPassword: process.env.DB_PASSWORD,
jwtSecret: process.env.JWT_SECRET,
};
// Validate at startup
if (!config.apiKey || !config.dbPassword || !config.jwtSecret) {
throw new Error('Missing required environment variables');
}
// β BAD - Hardcoded secrets
const config = {
apiKey: 'sk-1234567890abcdef', // NEVER DO THIS!
dbPassword: 'admin123',
jwtSecret: 'my-secret-key',
};
```
**SEC-4: Never Log Sensitive Data (CRITICAL)**
```typescript
// β
GOOD - Redact sensitive fields
logger.info('User login attempt', {
userId: user.id,
email: user.email,
// password is NOT logged
});
// β BAD - Logging sensitive data
logger.info('User login', {
email: user.email,
password: user.password, // NEVER LOG PASSWORDS!
creditCard: user.creditCard, // NEVER LOG PII!
});
```
**SEC-5: Authentication Best Practices**
```typescript
import bcrypt from 'bcrypt';
import jwt from 'jsonwebtoken';
// β
GOOD - Secure password hashing
async function hashPassword(password: string): Promise<string> {
const saltRounds = 12;
return bcrypt.hash(password, saltRounds);
}
async function verifyPassword(password: string, hash: string): Promise<boolean> {
return bcrypt.compare(password, hash);
}
// β
GOOD - Secure JWT generation
function generateToken(userId: string): string {
return jwt.sign(
{ userId },
process.env.JWT_SECRET!,
{
expiresIn: '1h',
algorithm: 'HS256',
}
);
}
// β BAD - Plain text password storage
function savePassword(password: string) {
db.query('INSERT INTO users (password) VALUES (?)', [password]); // NEVER!
}
```
**SEC-6: SQL Injection Prevention**
```typescript
// β
GOOD - Parameterized queries
async function getUserByEmail(email: string) {
return db.query(
'SELECT * FROM users WHERE email = $1',
[email] // Parameterized
);
}
// β BAD - String concatenation (SQL injection!)
async function getUserByEmail(email: string) {
return db.query(
`SELECT * FROM users WHERE email = '${email}'` // SQL Injection!
);
}
```
**SEC-7: CSRF Protection**
```typescript
import csrf from 'csurf';
import cookieParser from 'cookie-parser';
// β
GOOD - CSRF tokens
app.use(cookieParser());
app.use(csrf({ cookie: true }));
app.get('/form', (req, res) => {
res.render('form', { csrfToken: req.csrfToken() });
});
app.post('/submit', (req, res) => {
// CSRF token automatically verified
res.send('Data processed');
});
```
**SEC-8: Secure Headers**
```typescript
import helmet from 'helmet';
// β
GOOD - Security headers
app.use(helmet({
contentSecurityPolicy: {
directives: {
defaultSrc: ["'self'"],
scriptSrc: ["'self'", "'unsafe-inline'"],
styleSrc: ["'self'", "'unsafe-inline'"],
imgSrc: ["'self'", "data:", "https:"],
},
},
hsts: {
maxAge: 31536000,
includeSubDomains: true,
preload: true,
},
}));
// Cookie security
app.use(session({
secret: process.env.SESSION_SECRET!,
cookie: {
secure: true, // HTTPS only
httpOnly: true, // No JavaScript access
sameSite: 'strict', // CSRF protection
maxAge: 3600000, // 1 hour
},
}));
```
## Security Checklist (Quick Reference)
Before deploying to production:
- [ ] All inputs validated at system boundaries
- [ ] All outputs sanitized (XSS prevention)
- [ ] No hardcoded secrets (use env vars/vault)
- [ ] Passwords hashed with bcrypt (saltRounds >= 12)
- [ ] SQL queries parameterized (no string concatenation)
- [ ] CSRF protection enabled
- [ ] Security headers configured (Helmet.js)
- [ ] HTTPS enforced (TLS 1.2+)
- [ ] Rate limiting implemented
- [ ] Authentication tokens expire
- [ ] Sensitive data never logged
- [ ] Dependency vulnerabilities checked
- [ ] Error messages don't leak info
## OWASP Top 10 Quick Reference
1. **Broken Access Control** β Implement proper authorization checks
2. **Cryptographic Failures** β Use strong encryption, TLS everywhere
3. **Injection** β Parameterized queries, input validation
4. **Insecure Design** β Security by design, threat modeling
5. **Security Misconfiguration** β Secure defaults, minimal permissions
6. **Vulnerable Components** β Keep dependencies updated
7. **Authentication Failures** β MFA, secure session management
8. **Data Integrity Failures** β Verify data integrity, use signatures
9. **Logging Failures** β Log security events, protect logs
10. **SSRF** β Validate URLs, whitelist allowed domains
## Detailed Patterns (Level 2 - Load on Request)
See companion files:
- `owasp-guide.md` - Detailed OWASP Top 10 implementations
- `auth-patterns.md` - JWT, OAuth2, MFA implementations
- `encryption-guide.md` - Encryption at rest and in transit
## Security Tools (Level 3 - Load When Needed)
See scripts directory:
- `scripts/security-scan.sh` - Run comprehensive security scan
- `scripts/dependency-check.sh` - Check for vulnerable dependencies
- `scripts/secret-scan.sh` - Scan for exposed secrets
## Integration with Agents
**security-specialist:**
- Primary agent for security reviews
- Uses this skill for all security assessments
- Read-only access (no code modification)
**senior-fullstack-developer:**
- Uses this skill when implementing auth/security features
- References patterns for secure implementation
**qa-testing-engineer:**
- Uses this skill for security test cases
- Validates against security checklist
## Common Vulnerabilities & Fixes
### XSS (Cross-Site Scripting)
```typescript
// Vulnerable
function renderHTML(userInput: string) {
document.innerHTML = userInput; // XSS!
}
// Fixed
import DOMPurify from 'isomorphic-dompurify';
function renderHTML(userInput: string) {
const clean = DOMPurify.sanitize(userInput);
document.innerHTML = clean;
}
```
### Path Traversal
```typescript
// Vulnerable
app.get('/file/:filename', (req, res) => {
const file = path.join(__dirname, req.params.filename);
res.sendFile(file); // Path traversal: ../../etc/passwd
});
// Fixed
app.get('/file/:filename', (req, res) => {
const filename = path.basename(req.params.filename); // Remove path
const file = path.join(__dirname, 'uploads', filename);
// Ensure file is within allowed directory
if (!file.startsWith(path.join(__dirname, 'uploads'))) {
return res.status(403).send('Forbidden');
}
res.sendFile(file);
});
```
### NoSQL Injection
```typescript
// Vulnerable
function findUser(username: string) {
return db.users.findOne({ username }); // Can inject: {$ne: null}
}
// Fixed
function findUser(username: string) {
if (typeof username !== 'string') {
throw new ValidationError('Username must be a string');
}
return db.users.findOne({ username });
}
```
## Emergency Response
If a security vulnerability is discovered:
1. **Contain:** Disable affected feature if critical
2. **Assess:** Determine scope and impact
3. **Fix:** Apply patch immediately
4. **Test:** Verify fix doesn't break functionality
5. **Deploy:** Emergency deployment with monitoring
6. **Notify:** Inform stakeholders if data breach
7. **Postmortem:** Document incident and prevention
---
*Version 1.0.0 | OWASP Top 10 Compliant | GDPR Aware*
---
## Referenced Files
> The following files are referenced in this skill and included for context.
### scripts/security-scan.sh
```bash
#!/bin/bash
# Comprehensive Security Scan
# Checks for vulnerabilities, secrets, and security misconfigurations
set -e
echo "π Running comprehensive security scan..."
RED='\033[0;31m'
GREEN='\033[0;32m'
YELLOW='\033[1;33m'
NC='\033[0m'
ISSUES_FOUND=0
# 1. Dependency vulnerabilities
echo "π¦ Checking for vulnerable dependencies..."
if command -v npm &> /dev/null; then
if npm audit --audit-level=moderate; then
echo -e "${GREEN}β No moderate+ vulnerabilities in dependencies${NC}"
else
echo -e "${RED}β Vulnerable dependencies found${NC}"
ISSUES_FOUND=1
fi
else
echo -e "${YELLOW}β οΈ npm not found, skipping dependency check${NC}"
fi
# 2. Secret scanning
echo "π Scanning for exposed secrets..."
if command -v gitleaks &> /dev/null; then
if gitleaks detect --no-git --redact; then
echo -e "${GREEN}β No secrets detected${NC}"
else
echo -e "${RED}β Potential secrets found${NC}"
ISSUES_FOUND=1
fi
else
echo " Manual pattern check..."
PATTERNS=(
"password\s*=\s*['\"][^'\"]{8,}['\"]"
"api[_-]?key\s*=\s*['\"][^'\"]+['\"]"
"secret\s*=\s*['\"][^'\"]+['\"]"
"token\s*=\s*['\"][^'\"]+['\"]"
"aws_access_key_id"
"private[_-]?key"
"-----BEGIN.*PRIVATE KEY-----"
)
for pattern in "${PATTERNS[@]}"; do
if grep -r -E "$pattern" . \
--exclude-dir=node_modules \
--exclude-dir=.git \
--exclude-dir=dist \
--exclude="*.md" 2>/dev/null | grep -v "EXAMPLE\|PLACEHOLDER\|YOUR_.*_HERE"; then
echo -e "${RED}β Potential secret found: $pattern${NC}"
ISSUES_FOUND=1
fi
done
if [ $ISSUES_FOUND -eq 0 ]; then
echo -e "${GREEN}β No obvious secrets detected${NC}"
fi
fi
# 3. Hardcoded IPs/URLs
echo "π Checking for hardcoded IPs/URLs..."
if grep -r -E "https?://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" . \
--exclude-dir=node_modules \
--exclude-dir=.git 2>/dev/null | grep -v localhost | grep -v "127.0.0.1"; then
echo -e "${YELLOW}β οΈ Hardcoded IP addresses found${NC}"
fi
# 4. Insecure functions
echo "β οΈ Checking for insecure code patterns..."
INSECURE_PATTERNS=(
"eval\("
"innerHTML\s*="
"dangerouslySetInnerHTML"
"exec\("
"__dirname.*req\."
)
for pattern in "${INSECURE_PATTERNS[@]}"; do
if grep -r -E "$pattern" . \
--include="*.ts" \
--include="*.tsx" \
--include="*.js" \
--include="*.jsx" \
--exclude-dir=node_modules \
--exclude-dir=.git 2>/dev/null; then
echo -e "${YELLOW}β οΈ Potentially insecure pattern: $pattern${NC}"
fi
done
# 5. SQL injection risks
echo "π Checking for SQL injection risks..."
if grep -r -E "query\(['\"].*\$\{" . \
--include="*.ts" \
--include="*.js" \
--exclude-dir=node_modules 2>/dev/null; then
echo -e "${RED}β Potential SQL injection (string interpolation in query)${NC}"
ISSUES_FOUND=1
fi
# 6. Missing security headers check
echo "π‘οΈ Checking for security headers..."
if grep -r "helmet\|csurf\|express-rate-limit" . \
--include="*.ts" \
--include="*.js" \
--exclude-dir=node_modules 2>/dev/null > /dev/null; then
echo -e "${GREEN}β Security middleware detected${NC}"
else
echo -e "${YELLOW}β οΈ No security middleware found (helmet, csurf, rate-limit)${NC}"
fi
# 7. HTTPS enforcement
echo "π Checking for HTTPS enforcement..."
if grep -r "secure:\s*true" . \
--include="*.ts" \
--include="*.js" \
--exclude-dir=node_modules 2>/dev/null > /dev/null; then
echo -e "${GREEN}β Secure cookies configured${NC}"
else
echo -e "${YELLOW}β οΈ No secure cookie configuration found${NC}"
fi
# 8. Password complexity
echo "π Checking password handling..."
if grep -r "bcrypt\|argon2" . \
--include="*.ts" \
--include="*.js" \
--exclude-dir=node_modules 2>/dev/null > /dev/null; then
echo -e "${GREEN}β Strong password hashing detected${NC}"
else
echo -e "${YELLOW}β οΈ No password hashing library found${NC}"
fi
# Summary
echo ""
echo "π Security Scan Summary:"
if [ $ISSUES_FOUND -eq 0 ]; then
echo -e "${GREEN}β
No critical security issues found${NC}"
exit 0
else
echo -e "${RED}β Security issues detected. Review and remediate immediately.${NC}"
exit 1
fi
```