CtrlK
BlogDocsLog inGet started
Tessl Logo

dryrunsecurity/remediation

Helps fix security vulnerabilities identified by DryRunSecurity. Activates when the user shares a DryRunSecurity comment (from a GitHub PR or GitLab MR) or asks for help fixing any security finding including SQL injection, XSS, CSRF, SSRF, path traversal, command injection, authentication bypass, authorization flaws, and prompt injection. Researches authoritative sources and applies fixes grounded in the user's specific codebase context.

99

Quality

99%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

Overview
Skills
Evals
Files

FINDING_FORMAT.md

DryRunSecurity Finding Format

DryRunSecurity findings follow this format:

<summary paragraph describing what the PR/MR introduces>

<details>
<summary>
[emoji] Vulnerability Title in <code>path/to/file.ext</code>
</summary>

| **Vulnerability** | Vulnerability Name |
|:---|:---|
| **Description** | Detailed explanation... |

<Permalink to affected lines>
</details>

Key Elements to Extract

ElementLocationExample
Vulnerability typeTable row"Prompt Injection", "Cross-Site Scripting"
File path<code> tag in summaryopenhands/runtime/file_ops.py
Line numbersPermalink#L231-L232 → lines 231-232
DescriptionTable rowAttack scenario and why it's vulnerable
SeverityEmoji:yellow_circle: = needs attention, none = blocking

Example Parsing

Summary: "Prompt Injection in <code>openhands/.../file_ops.py</code>"
→ Vulnerability: Prompt Injection
→ File: openhands/runtime/plugins/agent_skills/file_ops/file_ops.py
→ Lines: 231-232 (from permalink)
→ Issue: User input concatenated directly into LLM prompt without sanitization

Install with Tessl CLI

npx tessl i dryrunsecurity/remediation@0.1.0

DRYRUN_FILTERING.md

FINDING_FORMAT.md

SKILL.md

tile.json

VULNERABILITY_TYPES.md