Back to skills
SkillHub ClubRun DevOpsFull StackSecurity

dev-security

Security audit with Sentinel. Checks for vulnerabilities, secrets, dependencies, and security best practices. Use before shipping or when working on auth/crypto/sensitive areas.

Packaged view

This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.

Stars
11
Hot score
85
Updated
March 20, 2026
Overall rating
C2.2
Composite score
2.2
Best-practice grade
B84.0

Install command

npx @skill-hub/cli install toruai-toru-claude-agents-dev-security

Repository

ToruAI/toru-claude-agents

Skill path: skills/dev-security

Security audit with Sentinel. Checks for vulnerabilities, secrets, dependencies, and security best practices. Use before shipping or when working on auth/crypto/sensitive areas.

Open repository

Best for

Primary workflow: Run DevOps.

Technical facets: Full Stack, Security.

Target audience: everyone.

License: Unknown.

Original source

Catalog source: SkillHub Club.

Repository owner: ToruAI.

This is still a mirrored public skill entry. Review the repository before installing into production workflows.

What it helps with

  • Install dev-security into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
  • Review https://github.com/ToruAI/toru-claude-agents before adding dev-security to shared team environments
  • Use dev-security for development workflows

Works across

Claude CodeCodex CLIGemini CLIOpenCode

Favorites: 0.

Sub-skills: 0.

Aggregator: No.

Original source / Raw SKILL.md

---
name: dev-security
description: Security audit with Sentinel. Checks for vulnerabilities, secrets, dependencies, and security best practices. Use before shipping or when working on auth/crypto/sensitive areas.
---

# Dev Security - Security Audit

Delegate to Sentinel for comprehensive security review.

## Philosophy

"Every line of code is guilty until proven innocent."

## Flow

### 1. Context Gathering

```bash
# What changed?
git diff --name-only HEAD~10 2>/dev/null || git diff --name-only

# What's the scope?
ls -la
```

### 2. Invoke Sentinel

Delegate to Sentinel agent:

```
"Sentinel, security audit time.

Scope: {describe what changed or focus area}

Run your full checklist:
1. Secrets scan
2. Dependency audit
3. Injection vectors
4. Auth/authz review
5. Crypto check

Files changed: {list from git diff}

Be thorough. We're not shipping vulnerabilities."
```

### 3. Review Sentinel's Findings

Sentinel returns findings by severity:
- **CRITICAL**: Must fix before merge
- **HIGH**: Should fix before merge
- **MEDIUM**: Should fix soon
- **LOW**: Consider fixing

### 4. Action on Findings

**If CRITICAL or HIGH found:**
```
Security audit found issues:

CRITICAL:
- [Issue 1 with location and fix]

HIGH:
- [Issue 2 with location and fix]

Options:
1. Fix now (Bob will implement Sentinel's fixes)
2. Fix manually, run /dev-security again
3. Accept risk (requires explicit acknowledgment)
4. Get second opinion (run deeper audit)
```

**If only MEDIUM/LOW:**
```
Security audit passed with notes.

MEDIUM:
- [Issue with suggestion]

LOW:
- [Issue with suggestion]

These don't block shipping but should be tracked.
Add to backlog? (y/n)
```

**If clean:**
```
Security audit passed!

Sentinel says: "Huh. Someone actually read the OWASP guide. Respect."

Ready for:
- /dev-rc - Release candidate
- /dev-finish - Close the cycle
```

### 5. Log Results

If active dev-cycle session:
```markdown
## Security Audit
- **Date**: {timestamp}
- **Status**: PASSED | PASSED_WITH_NOTES | FAILED
- **Critical**: 0
- **High**: 0
- **Medium**: 2
- **Low**: 1

### Findings
{Summary of what was found and resolved}
```

## Focus Modes

### Full Audit (default)
```
/dev-security
```
Everything: secrets, deps, code, config, infra

### Quick Scan
```
/dev-security quick
```
Just the critical stuff: secrets, known CVEs, obvious injection

### Specific Focus
```
/dev-security auth
/dev-security crypto
/dev-security deps
/dev-security secrets
```

Focus on one area for deeper review.

## What Sentinel Checks

| Area | What | Why |
|------|------|-----|
| Secrets | Hardcoded keys, tokens, passwords | #1 breach cause |
| Dependencies | Known CVEs, outdated packages | Supply chain attacks |
| Injection | SQL, XSS, command, path traversal | OWASP Top 10 |
| Auth | Broken auth, missing authz | Gateway to everything |
| Crypto | Weak algorithms, hardcoded keys | Data protection |
| Config | Exposed debug, permissive CORS | Misconfiguration |

## Integration

**With dev-cycle**: Logs findings to session
**With dev-rc**: Security must pass for release candidate
**With Bob**: Implements fixes for findings
**With Sentinel**: The security brain

## When to Run

- Before any PR
- After implementing auth/authz
- After adding new dependencies
- After handling user input
- After touching crypto
- Before any release
- When Sentinel whispers "trust nothing"
dev-security | SkillHub