Find bugs, security vulnerabilities, and code quality issues in local branch changes. Use when asked to review changes, find bugs, security review, or audit code on the current branch.
100
100%
Does it follow best practices?
Impact
100%
1.28xAverage score across 3 eval scenarios
Risky
Do not use without reviewing
Attack surface mapping
Lists user inputs
100%
100%
Lists database queries
100%
100%
Notes auth/authz absence
100%
100%
Injection category checked
100%
100%
XSS category checked
62%
100%
Authorization category checked
100%
100%
Identifies SQL injection
100%
100%
Identifies template injection / XSS
100%
100%
Identifies missing auth on delete
100%
100%
Covers 4+ additional categories
25%
100%
No code changes made
100%
100%
Pre-conclusion audit process
Lists all changed files
100%
100%
Confirms files read completely
50%
100%
All 11 checklist categories present
58%
100%
Checklist item status recorded
40%
100%
Unverifiable areas noted
12%
100%
Findings appear after audit
0%
100%
Identifies token validation bypass
100%
100%
Identifies weak password hash
100%
100%
Identifies information disclosure
100%
100%
No code changes made
100%
100%
No invented issues
100%
100%
Issue reporting format and prioritization
File:Line in each finding
50%
100%
Severity field present
100%
100%
Problem field present
75%
100%
Evidence field present
75%
100%
Fix field present
100%
100%
References field present
0%
100%
Identifies command injection
100%
100%
Identifies information disclosure
100%
100%
Security before business logic
100%
100%
No stylistic issues reported
0%
100%
No code changes made
100%
100%
45417f2
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.