deep-audit

Map the entire codebase. Leave nothing unexplored.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "deep-audit" with this command: npx skills add shantoislamdev/skills/shantoislamdev-skills-deep-audit

Deep Audit

Phase 1: Discovery

Map the entire codebase. Leave nothing unexplored.

Actions:

  • Recursively list all directories and files

  • Identify: languages (by extension), frameworks (by config files), dependencies (by manifests)

  • Locate entry points: main files, route handlers, API endpoints, CLI parsers

  • Map trust boundaries: where external input enters, where data exits

Output: Mental model of architecture, data flow, and attack surface.

Phase 2: Audit Plan

Build a targeted checklist. Prioritize by risk.

Category Hunt for

Injection Unsanitized input → command execution, query construction, path building, template rendering

Auth/AuthZ Missing checks, weak tokens, session fixation, privilege escalation, IDOR

Crypto Broken algorithms, hardcoded keys, predictable randomness, missing encryption

Secrets Credentials in code, keys in configs, tokens in logs, env vars with defaults

Validation Type confusion, integer overflow, buffer issues, missing bounds checks

Errors Stack traces exposed, debug flags, verbose logging, unhandled exceptions

Data PII in logs, sensitive data unencrypted, insecure deserialization

Dependencies Known CVEs, outdated packages, typosquatting

Concurrency Race conditions, TOCTOU, deadlocks, shared state mutations

Logic Business logic bypasses, state machine violations, trust assumption failures

Rank by: Exploitability × Impact × Exposure

Phase 3: Deep Analysis

Hunt relentlessly. Every file. Every function. Every input path.

3.1 Secrets Scan

Search entire codebase for:

  • password , secret , api_key , token , credential , auth

  • -----BEGIN , PRIVATE KEY , ssh-rsa

  • Base64 blobs (40+ chars), hex strings (32+ chars)

  • Connection strings, DSNs, URIs with credentials

Verify each hit. False positive? Move on. Real secret? Flag as CRITICAL.

3.2 Injection Analysis

Trace every input source to every dangerous sink:

  • Sources: HTTP params, headers, body, files, env vars, CLI args, database reads, IPC

  • Sinks: Command execution, SQL/NoSQL queries, file operations, template engines, serializers, network calls

For each source→sink path: Is there sanitization? Is it sufficient? Can it be bypassed?

3.3 Auth & Access Control

  • Find all endpoints/functions requiring auth. Verify enforcement.

  • Check for horizontal privilege escalation (user A accessing user B's data)

  • Check for vertical privilege escalation (user becoming admin)

  • Look for auth bypasses: default credentials, magic parameters, debug routes

3.4 Crypto Review

  • List all crypto operations. Verify algorithms are current.

  • Check key generation: is randomness cryptographically secure?

  • Check key storage: hardcoded? plaintext? properly protected?

  • Verify encryption modes (no ECB), proper IV/nonce usage, authenticated encryption

3.5 Error & Exception Handling

  • Search for exception handlers. Are they too broad? Do they leak info?

  • Check HTTP error responses for stack traces, internal paths, versions

  • Look for debug/dev mode flags still enabled

  • Find logging statements with sensitive data

3.6 Dependency Audit

  • Extract all dependencies with versions

  • Check each against known vulnerability databases

  • Flag outdated packages (>1 year without update = suspicious)

  • Look for vendored/copied code that may have unpatched vulns

3.7 Logic & State

  • Identify state machines. Can states be skipped or forced?

  • Check financial/critical operations for race conditions

  • Verify atomic operations where needed

  • Look for time-of-check-time-of-use issues in file/resource access

Phase 4: Report

No fluff. Facts only.

Security Audit Report

Executive Summary

  • CRITICAL: [count]
  • HIGH: [count]
  • MEDIUM: [count]
  • LOW: [count]

Findings

[CRITICAL] Title

File: path/to/file:line Issue: [One sentence] Evidence: [Code block] Impact: [What attacker gains] Fix: [Specific remediation]

[Repeat for each finding, highest severity first]

Attack Scenarios

[2-3 realistic attack chains combining findings]

Rules

Do not act like typical AI slop. No lazy pattern matching. No surface-level scanning. No generic findings.

Bug or Feature?

Before flagging ANYTHING, run this verification:

  • Context check. Read surrounding code. Read comments. Read commit history if available.

  • Intent check. Could this be deliberate? Is there a security/usability tradeoff being made?

  • Documentation check. Is this behavior documented? Is it a known limitation?

  • Pattern check. Does similar code exist elsewhere? Is this project's convention?

  • Edge case check. Does this only fail under unrealistic conditions?

Ask yourself: Is this really a bug, or am I misunderstanding the design?

Only flag when you can answer:

  • Why this is NOT intentional

  • Why existing mitigations (if any) are insufficient

  • What realistic attack scenario exploits this

Core Rules

  • Verify everything. Read the actual code. No guessing.

  • Trace data flow. Follow inputs to outputs. Miss nothing.

  • Attack mindset. What would you exploit? How?

  • Quality over quantity. One confirmed vuln > ten maybes.

  • Precision. File:line, exact code, specific impact.

  • Actionable. Every finding has a concrete fix.

  • No false positives. When uncertain, investigate deeper—don't flag.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

audit-website

Audit websites for SEO, performance, security, technical, content, and 15 other issue cateories with 230+ rules using the squirrelscan CLI. Returns LLM-optimized reports with health scores, broken links, meta tag analysis, and actionable recommendations. Use to discover and asses website or webapp issues and health.

Repository Source
Security

better-auth-security-best-practices

No summary provided by upstream source.

Repository SourceNeeds Review
Security

swiftui-performance-audit

No summary provided by upstream source.

Repository SourceNeeds Review