Back to Templates
4.5 (8)
Security Audit
Comprehensive security audit checking for common vulnerabilities, dependency issues, and security best practices. Includes OWASP Top 10 checks.
security
Official
Featured
by RepoBird
Updated 10/18/2025
89 executions
Template Instructions
These instructions will be passed to the AI agent when executing this template
Perform comprehensive security audit on ACTUAL codebase:
-
Dependency Security:
- Identify the language/framework by examining dependency files
- Run the appropriate package audit tool for the detected language
- Document all findings with CVE numbers and severity levels
- Check for outdated, deprecated, or vulnerable packages
- Recommend secure alternatives for vulnerable dependencies
-
Code Security - Find vulnerabilities using search:
-
SQL Injection:
- Search for database queries built with string interpolation or concatenation
- Look for raw SQL queries without parameterization or prepared statements
- Find queries that directly embed user input
-
XSS Vulnerabilities:
- Search for user input rendered as HTML without escaping
- Find template rendering with disabled auto-escaping
- Look for direct DOM manipulation with user-controlled content
-
Command Injection:
- Search for system command execution functions
- Find shell commands built from user input
- Look for unsafe eval/exec patterns
-
Authentication Issues:
- Search for weak password hashing algorithms (MD5, SHA1)
- Find missing authentication checks on protected routes
- Look for insecure session management patterns
- Check for missing password complexity requirements
-
Hardcoded Secrets:
- Search for API keys, passwords, tokens in source code
- Look for cloud provider credentials (AWS, Azure, GCP)
- Find private keys or certificates in the repository
- Check if .env files are properly gitignored
-
Insecure File Operations:
- Search for path traversal patterns (../ in file paths)
- Find file uploads without type validation
- Look for file operations using user-controlled paths
-
Deserialization Vulnerabilities:
- Search for unsafe deserialization of untrusted data
- Find deserialization without type checking or validation
-
-
OWASP Top 10 Check: Review codebase against OWASP Top 10:
- Broken Access Control - Check authorization on routes/APIs
- Cryptographic Failures - Verify encryption at rest/transit
- Injection - SQL, NoSQL, Command, LDAP injection
- Insecure Design - Architecture flaws
- Security Misconfiguration - Default configs, exposed endpoints
- Vulnerable Components - Outdated dependencies
- Authentication Failures - Weak auth/session management
- Data Integrity Failures - Unsigned/unencrypted critical data
- Logging/Monitoring Failures - Insufficient logging
- SSRF - Unvalidated URL fetches
-
Create Detailed Report:
- Generate SECURITY_AUDIT.md in /docs directory
- Categorize by severity: Critical > High > Medium > Low
- For each issue include:
- File location and line numbers
- Vulnerability description
- OWASP category
- Remediation steps with code examples
- CVE numbers for dependencies
-
Fix Critical Issues:
- Fix critical/high severity issues where safe to do so
- Update vulnerable dependencies
- Add missing security headers (if web application)
- Remove hardcoded secrets and migrate to environment variables
- Add tests to verify security fixes
IMPORTANT: Scan REAL codebase for actual vulnerabilities, not create demonstrations.
Success Criteria
- Dependency vulnerabilities found and documented
- Code vulnerabilities found using search patterns
- All OWASP Top 10 risks evaluated
- Comprehensive SECURITY_AUDIT.md report generated
- Critical/high issues fixed with tests passing
- No hardcoded secrets remain
Completion Checklist
- Run dependency audit for detected language
- Search for vulnerabilities using appropriate patterns
- Generate detailed SECURITY_AUDIT.md report
- Fix critical and high-severity issues
- Add tests to verify security fixes
- Verify no new security issues introduced
Tags
OWASP
audit
security
vulnerabilities
Supported Languages
Any Language