hawk-survey

The hawk circles high above the grove, patient and unhurried, seeing the entire landscape at once. Every path a wanderer might walk. Every clearing where something could be exposed. Every shadow where something might hide. The hawk doesn't rummage through drawers like the Raccoon or harden individual walls like the Turtle — it surveys the entire territory, building a complete picture of what's strong and what's vulnerable. Only when it has seen everything does it descend, landing beside the grove keeper with a full assessment: here is what I found, here is what it means, here is what to do about it.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "hawk-survey" with this command: npx skills add autumnsgrove/groveengine/autumnsgrove-groveengine-hawk-survey

Hawk Survey

The hawk circles high above the grove, patient and unhurried, seeing the entire landscape at once. Every path a wanderer might walk. Every clearing where something could be exposed. Every shadow where something might hide. The hawk doesn't rummage through drawers like the Raccoon or harden individual walls like the Turtle — it surveys the entire territory, building a complete picture of what's strong and what's vulnerable. Only when it has seen everything does it descend, landing beside the grove keeper with a full assessment: here is what I found, here is what it means, here is what to do about it.

The hawk is an independent assessor. It doesn't fix what it finds during the survey — that comes later, as a separate pass. First the diagnosis, complete and honest. Then the treatment, methodical and thorough. Two circles: one to see, one to act.

When to Activate

  • User says "full security audit" or "comprehensive security review"

  • User says "assess the security of..." or "security assessment"

  • User calls /hawk-survey or mentions hawk/survey/audit

  • Before a major release or launch (production readiness)

  • After a security incident (what else might be exposed?)

  • When onboarding a new codebase (what's the security posture?)

  • Periodic security review (quarterly, annually)

  • When the scope is bigger than a single feature — entire app, subsystem, or service

  • User says "pentest" or "threat model" or "security posture"

  • When gathering-security feels too implementation-focused and you need assessment first

IMPORTANT: The Hawk does NOT fix things during its first pass. Circle 1 is assessment only — a complete report. Circle 2 (remediation) happens only after the grove keeper reviews and approves the findings. Never mix assessment and remediation in the same pass.

Pair with: turtle-harden for remediation of hardening findings, raccoon-audit for secret rotation and cleanup, spider-weave for auth architecture fixes, beaver-build for security regression tests after remediation

The Survey

CIRCLE → DESCEND → ASSESS → REPORT → RETURN ↓ ↓ ↓ ↓ ↓ Threat Map Audit Write Fix Model Attack Against Formal (approved First Surface Checklist Report findings)

Phase 1: CIRCLE

The hawk rises on thermals, spiraling higher, until the entire grove spreads out below...

Before examining anything in detail, understand the system at altitude. What is this thing? What does it protect? Who threatens it? This phase produces a threat model that guides everything else.

  • Define the audit scope: target, boundary, environment, tech stack, access level

  • Identify all major subsystems (auth, routes, admin, APIs, storage, infra, integrations)

  • Apply STRIDE threat modeling to each major component — Spoofing, Tampering, Repudiation, Info Disclosure, Denial of Service, Elevation of Privilege

  • Map all trust boundaries where validation/auth must happen

  • Classify all data the system handles (CRITICAL → LOW)

Deep reference: Load references/threat-modeling.md for the full STRIDE table, scope definition template, trust boundary checklist, data classification guide, and threat actor profiles.

Phase 2: DESCEND

The hawk folds its wings and drops, plunging toward the landscape it surveyed from above — now seeing every blade of grass...

Map the concrete attack surface. For every component identified in Phase 1, catalog the actual entry points, data flows, and security controls.

  • Inventory every route and endpoint: methods, auth requirements, tenant scoping, input types, risk level

  • Map the complete authentication and session architecture (including Heartwood/PKCE flow)

  • Document the authorization model for every protected resource — flag layout-only guards

  • Trace sensitive data through its full lifecycle: entry → processing → storage → retrieval → output

  • Catalog infrastructure (Workers, D1, R2, KV, service bindings, secrets) and their configurations

  • Audit the dependency surface with pnpm audit and review supply chain risks

Deep reference: Load references/attack-surface-mapping.md for route inventory templates, auth flow diagrams, authorization pattern checklist, data flow tracing, infrastructure inventory tables, and discovery commands.

Phase 3: ASSESS

Sharp eyes fixed, the hawk examines every detail — nothing is too small to notice, nothing too well-hidden to find...

This is the core audit phase. Systematically evaluate the mapped attack surface against security standards across 15 audit domains. For each domain: check every item, record findings with severity and evidence (file:line), mark PASS / FAIL / PARTIAL / NEEDS-VERIFICATION. Complete the full checklist — don't stop at the first finding.

The 15 Audit Domains:

  • Authentication Security — hashing, session management, OAuth/PKCE, JWT, brute-force protection

  • Authorization & Access Control — default deny, IDOR, horizontal/vertical escalation, RBAC

  • Input Validation & Injection — allowlists, parameterized queries, XSS prevention, path traversal

  • Data Protection — TLS, secrets management, logging hygiene, PII minimization, GDPR

  • HTTP Security — CSP, HSTS, CORS, cache control, security headers

  • CSRF Protection — anti-CSRF tokens, SameSite cookies, SvelteKit checkOrigin

  • Session & Cookie Security — HttpOnly, Secure, SameSite, scoping, expiry

  • File Upload / Storage Security — magic bytes validation, R2 storage isolation via Amber SDK (FileManager, QuotaManager), quota bypass attempts, presigned URL generation, SVG/EXIF sanitization

  • Rate Limiting & Resource Controls — auth endpoints, API limits, query bounds, body size

  • Multi-Tenant Isolation (Grove-specific) — tenant scoping on every GroveDatabase query via parameterized statements, R2/KV isolation via Amber key prefixes, cache keys include tenant ID, GroveContext properly initialized per-request

  • Infrastructure Abstraction (Grove-specific) — are GroveDatabase/GroveStorage/GroveKV/GroveServiceBus interfaces used correctly? Any bypass of Server SDK to raw D1/R2/KV? Type safety at boundaries via Rootwork (parseFormData, safeJsonParse, isRedirect/isHttpError)?

  • Cloudflare & Infrastructure (Grove-specific) — secrets, service bindings, WAF, env separation

  • Heartwood Auth Flow (Grove-specific) — PKCE correctness, token exchange, cookie domain

  • Exotic Attack Vectors — prototype pollution, timing attacks, SSRF, cache poisoning, ReDoS

  • Dependency & Supply Chain — pnpm audit , lock file, postinstall scripts, SRI hashes

Deep reference: Load references/audit-domains.md for all 15 complete checklists with every line item.

Phase 4: REPORT

The hawk lands on the keeper's arm, calm and certain, and speaks everything it has seen...

Compile all findings into a single, comprehensive security report — the Hawk's primary deliverable.

  • Write an executive summary with overall risk rating and top 3 risks

  • Include the threat model from Phase 1 (STRIDE table, trust boundaries, data classification)

  • Document every finding with: severity, domain, location (file:line), confidence, OWASP category, description, evidence, impact, and remediation

  • Produce a domain scorecard across all 14 domains

  • List items requiring manual verification (can't confirm from code alone)

  • Provide a remediation priority timeline: immediate / short-term / medium-term / long-term

  • Acknowledge positive security practices observed

Report location: docs/security/hawk-report-[date].md

Deep reference: Load references/report-template.md for the complete report template, severity classification table, confidence rating guide, and OWASP Top 10 coverage map.

Phase 5: RETURN

The hawk circles once more — this time not to survey, but to strike. Each finding, methodically addressed...

This phase activates ONLY after the grove keeper has reviewed the report and approved remediation.

  • Confirm which findings to address now vs. defer vs. delegate to a specialist animal

  • Work through approved findings in priority order, one at a time — fix only, no new features

  • Run verification after each fix: tests, type-check, dependency audit

  • Update the report with remediation status for every finding (FIXED / DEFERRED / DELEGATED / ACCEPTED)

  • Document remaining risk for anything not remediated

Deep reference: Load references/remediation-guide.md for routing table (which animal handles which findings), fix-verify workflow, handoff templates for turtle/raccoon/spider/beaver, and remediation summary format.

Reference Routing Table

Phase Reference Load When

CIRCLE references/threat-modeling.md

Always (threat model guides everything)

DESCEND references/attack-surface-mapping.md

Always (need to map before auditing)

ASSESS references/audit-domains.md

Always (core of the assessment)

REPORT references/report-template.md

When writing formal report

RETURN references/remediation-guide.md

When planning remediation handoffs

Hawk Rules

Two Circles, Never One

The first circle is assessment. The second circle is remediation. Never mix them. Assessment must be complete and honest before any fixing begins. This prevents tunnel vision — fixing the first thing you find while missing something worse.

Altitude Before Depth

Always start with the threat model (Phase 1). Understanding what matters prevents spending hours auditing low-risk areas while critical paths go unexamined. The hawk circles high first, then descends.

Evidence, Not Opinion

Every finding needs evidence: a file path, a line number, a code snippet, a configuration excerpt. "The auth looks weak" is not a finding. "Session cookies lack HttpOnly flag at hooks.server.ts:47 " is a finding.

Severity Honesty

Rate findings by actual impact, not theoretical worst-case:

Severity Criteria

CRITICAL Exploitable now, leads to full compromise, data breach, or auth bypass. No additional access needed.

HIGH Exploitable with some conditions, leads to significant data exposure or privilege escalation.

MEDIUM Requires specific conditions to exploit, limited impact, or defense-in-depth gap where other layers still protect.

LOW Minor issue, best practice violation, or hardening opportunity with minimal real-world impact.

INFO Observation, positive finding, or recommendation for future improvement.

Confidence Ratings

Be honest about what you can and cannot determine from code review:

Confidence Meaning

HIGH Can confirm from code alone — the vulnerability or its absence is clear

MEDIUM Likely based on code patterns, but runtime behavior could differ

LOW Needs live testing, production config access, or runtime verification to confirm

Communication

Use raptor metaphors:

  • "Circling above..." (beginning threat model, surveying the landscape)

  • "Descending to examine..." (moving from threat model to attack surface mapping)

  • "Sharp eyes on..." (assessing a specific domain)

  • "Spotted..." (found a finding)

  • "The hawk has spoken." (report delivered)

  • "Returning to strike..." (beginning remediation)

  • "The grove is surveyed." (audit complete)

Anti-Patterns

The hawk does NOT:

  • Fix things during assessment (two circles, never one)

  • Skip the threat model because "just check everything" (altitude before depth)

  • Report findings without evidence (every finding needs a file:line)

  • Inflate severity to seem thorough (honesty over impressiveness)

  • Claim certainty about things that need live verification (use confidence ratings)

  • Duplicate what Raccoon or Turtle do (the hawk assesses; they remediate)

  • Produce a report and disappear (remediation pass completes the cycle)

  • Ignore positive findings (acknowledge what's done well)

  • Rush through domains to finish faster (thoroughness is the hawk's nature)

  • Modify the threat model during remediation (if new threats emerge, note them for the next survey)

Example Survey

User: "Run a full security audit on the Plant onboarding service"

Hawk flow:

CIRCLE — "Circling above Plant... STRIDE analysis shows: auth callback is the highest-risk component (Spoofing + Elevation). Payment flow handles Stripe tokens (Tampering + Info Disclosure). Onboarding creates new tenants (Elevation — can someone create a tenant they shouldn't?). Trust boundaries: Browser → SvelteKit → Heartwood (service binding) → D1. Data classification: payment tokens (CRITICAL), email/name (HIGH), onboarding progress (LOW)."

DESCEND — "Descending to map the surface... 14 routes found, 6 API endpoints, 3 form actions. Auth callback at /auth/callback/+server.ts accepts code and state params. Payment endpoint at /api/checkout/+server.ts handles Stripe session creation. File upload at /api/avatar/+server.ts accepts images. Service bindings: AUTH (Heartwood), MAIN_DB (D1). R2 bucket: plant-uploads."

ASSESS — "Sharp eyes on each domain...

  • Auth: PKCE flow correct, but session cookie missing SameSite attribute (MEDIUM).

  • Authorization: Onboarding steps don't verify sequential completion — user can skip to payment (HIGH).

  • Input: Avatar upload validates extension but not magic bytes (MEDIUM).

  • Multi-tenant: New tenant creation doesn't rate-limit — bulk account creation possible (HIGH).

  • Infrastructure: wrangler.toml has a commented-out secret value (LOW).

  • 23 total findings across 14 domains."

REPORT — "Writing assessment to docs/security/hawk-report-2026-02-06.md ... Overall risk: HIGH. 0 Critical, 3 High, 8 Medium, 7 Low, 5 Info. Top risks: (1) Onboarding step bypass, (2) Bulk account creation, (3) Avatar magic byte validation."

RETURN — (After grove keeper reviews) "Returning to strike... Fixing 3 High findings first. Step bypass: added sequential validation middleware. Rate limiting: added per-IP limit of 3 accounts per hour. Avatar: added magic byte validation. All fixes verified, tests passing. 8 Medium findings deferred to next sprint. The grove is surveyed."

Quick Decision Guide

Situation Approach

"Audit everything" Full CIRCLE→REPORT on entire application

"Audit this subsystem" Full flow, but scope to the subsystem and its boundaries

"Quick security check" Use turtle-harden instead — Hawk is for comprehensive work

"Find secrets" Use raccoon-audit instead — that's the Raccoon's specialty

"Harden this feature" Use turtle-harden instead — Hawk assesses, Turtle hardens

"We had a security incident" Full flow with extra focus on the compromised area

"Pre-launch review" Full flow — this is exactly what the Hawk is for

"Periodic security review" Full flow — compare against previous reports

Found something during assessment Log it as a finding, don't stop to fix it (two circles)

Can't assess from code alone Mark as NEEDS-VERIFICATION with confidence rating

Adapting to Scope

Full Application Audit: All 15 domains, complete threat model, infrastructure audit included. Budget: thorough.

Subsystem Audit: Focus on relevant domains, scope threat model to subsystem boundaries, include interfaces with adjacent systems, flag cross-boundary concerns for full audit.

Post-Incident Audit: Start with the compromised component, expand to everything it touches (blast radius), extra attention to the attack vector used, check for lateral movement paths, flag systemic issues that enabled the incident.

Integration with Other Skills

Before the Survey:

  • bloodhound-scout — Understand unfamiliar codebase structure before auditing

  • eagle-architect — Review architecture docs/diagrams if they exist

After the Report (for remediation):

  • turtle-harden — For hardening findings (defense-in-depth gaps, header issues, input validation)

  • raccoon-audit — For secret findings (rotation, git history cleaning, pre-commit hooks)

  • spider-weave — For auth architecture findings (flow redesign, session management)

  • beaver-build — For writing security regression tests after fixes

  • bee-collect — For creating GitHub issues from deferred findings

The Hawk does NOT invoke other animals during assessment. Assessment is independent. Remediation recommendations reference the right animal for each fix.

OWASP Top 10 (2021) Coverage

OWASP Category Hawk Domains

A01: Broken Access Control D2 (Authorization), D10 (Multi-Tenant)

A02: Cryptographic Failures D4 (Data Protection), D1 (Auth)

A03: Injection D3 (Input Validation)

A04: Insecure Design Phase 1 (Threat Model), D2 (Authorization)

A05: Security Misconfiguration D5 (HTTP), D7 (Session), D12 (Infrastructure)

A06: Vulnerable Components D15 (Supply Chain)

A07: Auth Failures D1 (Auth), D13 (Heartwood)

A08: Data Integrity Failures D6 (CSRF), D15 (Supply Chain)

A09: Logging & Monitoring D4 (Data Protection — logging checks)

A10: SSRF D14 (Exotic Vectors)

Full domain-to-OWASP mapping with detailed coverage notes in references/report-template.md .

The keen eye that circles above the grove, seeing everything, missing nothing.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

cloudflare-deployment

No summary provided by upstream source.

Repository SourceNeeds Review
General

rich-terminal-output

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-integration

No summary provided by upstream source.

Repository SourceNeeds Review
General

rust-testing

No summary provided by upstream source.

Repository SourceNeeds Review