feat: Optimize all 18 command files using @include reference system

Major streamlining achievement:
- Eliminate 2,733 lines of duplicate content across commands
- Reduce individual command files by ~70% (130-150 → 35-60 lines)
- Leverage existing shared/*.yml reference patterns
- Maintain full Claude Code compliance

Benefits:
• Single source of truth for universal content
• Guaranteed consistency across all commands
• Dramatically reduced maintenance overhead
• Massive token efficiency improvements

Implementation:
- Universal Legend: @include shared/universal-constants.yml#Universal Legend
- Universal Flags: @include shared/flag-inheritance.yml#Universal_Always
- Command patterns: References to appropriate shared/*.yml files
- Template system: Enhanced command-patterns.yml

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
NomenAK
2025-06-24 22:46:52 +02:00
parent d8727a6a07
commit 219ff3905a
20 changed files with 1127 additions and 3860 deletions

View File

@@ -1,351 +1,57 @@
# /scan - Perform security and validation scans
# /scan - Security and quality scanning
## Legend
| Symbol | Meaning | | Abbrev | Meaning |
|--------|---------|---|--------|---------|
| → | leads to | | cfg | configuration |
| & | and/with | | impl | implementation |
| w/ | with | | perf | performance |
| @ | at/located | | ops | operations |
| > | greater than | | val | validation |
| ∀ | for all/every | | req | requirements |
| ∃ | exists/there is | | deps | dependencies |
| ∴ | therefore | | env | environment |
| ∵ | because | | db | database |
| ≡ | equivalent | | api | interface |
| ≈ | approximately | | docs | documentation |
| 📁 | directory/path | | std | standard |
| 🔢 | number/count | | def | default |
| 📝 | text/string | | ctx | context |
| ⚙ | setting/config | | err | error |
| 🎛 | control/flags | | exec | execution |
| 🔧 | configuration | | qual | quality |
| 📋 | group/category | | rec | recovery |
| 🚨 | critical/urgent | | sev | severity |
| ⚠ | warning/caution | | resp | response |
| 🔄 | retry/recovery | | esc | escalation |
| ✅ | success/fixed | | tok | token |
| ❌ | failure/error | | opt | optimization |
| | information | | UX | user experience |
| ⚡ | fast/quick | | UI | user interface |
| 🐌 | slow/delayed | | C | critical |
| ✨ | complete/done | | H | high |
| 📖 | read operation | | M | medium |
| ✏ | edit operation | | L | low |
| 🗑 | delete operation | | |
@include shared/universal-constants.yml#Universal_Legend
## Purpose
Perform comprehensive security and validation scans on code, operations, or systems specified in $ARGUMENTS to identify vulnerabilities and safety issues.
Perform comprehensive security, quality, and dependency scanning on code specified in $ARGUMENTS.
## Syntax
`/scan [flags] [target]`
## Universal Flags
--plan: "Show execution plan before running"
--uc: "UltraCompressed mode (~70% token reduction)"
--ultracompressed: "Alias for --uc"
--think: "Multi-file analysis w/ context (4K tokens)"
--think-hard: "Deep architectural analysis (10K tokens)"
--ultrathink: "Critical system redesign (32K tokens)"
--c7: "Enable Context7→library documentation lookup"
--seq: "Enable Sequential→complex analysis & thinking"
--magic: "Enable Magic→UI component generation"
--pup: "Enable Puppeteer→browser automation & testing"
--all-mcp: "Enable all MCP servers"
--no-mcp: "Disable all MCP servers (native tools only)"
--no-c7: "Disable Context7 specifically"
--no-seq: "Disable Sequential thinking specifically"
--no-magic: "Disable Magic UI builder specifically"
--no-pup: "Disable Puppeteer specifically"
@include shared/flag-inheritance.yml#Universal_Always
Examples:
- `/scan --security` - Security vulnerability scan
- `/scan --deps` - Dependency audit
- `/scan --validate` - Full validation scan
- `/scan --quick` - Quick scan for critical issues
## Command-Specific Flags
--security: "Deep security vulnerability scanning (OWASP, CVEs, secrets)"
--deps: "Dependency vulnerability audit w/ fix recommendations"
--validate: "Comprehensive validation (syntax, types, logic, security)"
--quick: "Fast scan focusing on critical issues only"
--fix: "Auto-fix safe issues"
--strict: "Zero-tolerance mode (fail on any issue)"
--report: "Generate detailed report"
--ci: "CI-friendly output format"
**Scan Types:**
- `--validate`: Pre-execution safety validation and risk assessment
- `--security`: Comprehensive security analysis and vulnerability scanning
- `--owasp`: Focus on OWASP Top 10 security risks
- `--deps`: Dependency vulnerability and license scanning
- `--config`: Configuration security and compliance checking
## Scan Types
**Scan Depth:**
- `--quick`: Fast validation for common issues with rapid feedback
- `--comprehensive`: Deep analysis covering all security aspects
- `--strict`: Zero-tolerance mode flagging all potential issues
**Security Scan:** OWASP Top 10 | Injection vulnerabilities | Auth flaws | Sensitive data exposure | Hardcoded secrets | CVE database check
**Specialized Scans:**
- `--infrastructure`: Infrastructure and deployment security
- `--code`: Source code security analysis
- `--data`: Data protection and privacy compliance
- `--network`: Network security and exposure analysis
**Dependency Scan:** Known vulnerabilities | Outdated packages | License compliance | Supply chain risks | Transitive dependencies
**Output Control:**
- `--report`: Generate detailed security report
- `--json`: Output results in JSON format for automation
- `--summary`: Provide executive summary with key findings
**Code Quality:** Complexity metrics | Duplication | Dead code | Type safety | Best practices | Performance antipatterns
## Examples
- `/scan --validate --quick` → Fast pre-execution safety check
- `/scan --security --owasp --comprehensive` → Complete OWASP security audit
- `/scan --deps --strict --report` → Dependency scan with detailed report
- `/scan --validate --security --think` → Combined validation and security with analysis
- `/scan --infrastructure --config --json` → Infrastructure security in JSON format
**Configuration:** Misconfigured services | Insecure defaults | Missing security headers | Exposed endpoints | Weak crypto
## Validation Mode (--validate)
## Validation Levels
**Pre-Execution Safety Checks:**
**Quick (--quick):** Critical security only | Known CVEs | Hardcoded secrets | SQL injection | XSS vulnerabilities
**Security Validation:**
- Path traversal prevention and boundary enforcement
- Secrets and credentials detection in code
- Permission verification and access control
- Input sanitization and validation checks
- Output encoding and XSS prevention
**Standard (default):** All security checks | Major quality issues | Dependency vulnerabilities | Configuration problems
**Code Validation:**
- Syntax correctness and compilation checks
- Import and dependency verification
- Breaking change detection and compatibility
- Configuration validity and completeness
- Type safety and null pointer checks
**Strict (--strict):** Everything + minor issues | Style violations | Documentation gaps | Test coverage | Performance warnings
**Operation Validation:**
- Git repository state verification
- Branch protection compliance
- Resource availability and capacity
- Rollback capability assessment
- Blast radius and impact analysis
**Risk Assessment Framework:**
- Calculate comprehensive risk score (1-10)
- Impact analysis (data loss, downtime, security)
- Reversibility and recovery evaluation
- Required permissions and access verification
- Compliance and regulatory checks
**Validation Workflow:**
1. Parse and analyze intended operation
2. Run all applicable safety checks
3. Generate risk score and impact assessment
4. Report with clear status indicators:
-**Pass**: Safe to proceed without concerns
- ⚠️ **Warning**: Caution advised, review recommended
-**Block**: Do not proceed, issues must be resolved
## Security Mode (--security)
**OWASP Top 10 Analysis:**
- **Injection Flaws**: SQL, NoSQL, OS command, LDAP injection detection
- **Broken Authentication**: Session management and auth weakness detection
- **Sensitive Data Exposure**: Data protection and encryption analysis
- **XML External Entities (XXE)**: XML processing vulnerability detection
- **Broken Access Control**: Authorization and privilege escalation issues
- **Security Misconfiguration**: Configuration hardening assessment
- **Cross-Site Scripting (XSS)**: XSS vulnerability detection and prevention
- **Insecure Deserialization**: Object deserialization security analysis
- **Known Vulnerable Components**: Dependency vulnerability scanning
- **Insufficient Logging**: Security monitoring and audit trail analysis
**Code Security Analysis:**
- Input validation gaps and boundary checks
- Output encoding issues and data sanitization
- Authentication mechanism weaknesses
- Authorization logic flaws and privilege escalation
- Cryptographic implementation problems
- Error handling information leakage
- Session management security issues
- File operation safety and path traversal
**Dependency Security Scanning:**
- Known CVE (Common Vulnerabilities and Exposures) detection
- Outdated package identification with security implications
- License compliance and legal risk assessment
- Transitive dependency vulnerability analysis
- Security patch availability and update recommendations
- Typosquatting and malicious package detection
**Configuration Security:**
- Hardcoded secrets and credentials scanning
- Environment variable security assessment
- File and directory permission configurations
- Network exposure and attack surface analysis
- TLS/SSL configuration and certificate validation
- CORS policies and cross-origin security
- Security headers implementation verification
**Infrastructure Security:**
- Open ports and unnecessary services identification
- Firewall rules and network segmentation
- Access control lists and identity management
- Encryption in transit and at rest verification
- Backup security and disaster recovery assessment
- Logging configuration and audit trail analysis
## Scan Execution Modes
**Quick Scan (--quick):**
- Focus on most critical and common vulnerabilities
- Skip time-intensive deep analysis procedures
- Prioritize immediate security concerns
- Provide rapid feedback for development workflow
- Suitable for pre-commit hooks and fast CI/CD
**Comprehensive Scan (--comprehensive):**
- Complete security analysis across all categories
- Deep dive into complex security patterns
- Thorough dependency and configuration analysis
- Detailed threat modeling and risk assessment
- Suitable for periodic security audits
**Strict Mode (--strict):**
- Zero-tolerance approach to security issues
- Flag all potential security concerns
- Enforce industry best practices and standards
- Require explicit overrides for any findings
- Suitable for high-security environments
## Scan Results and Reporting
**Security Findings Classification:**
- **CRITICAL [10]**: Immediate action required, system at risk
- **HIGH [7-9]**: Fix before deployment, significant security risk
- **MEDIUM [4-6]**: Address in next development cycle
- **LOW [1-3]**: Best practice improvements, technical debt
**Report Contents:**
- Executive summary with overall risk assessment
- Detailed findings categorized by security domain
- Specific remediation steps with code examples
- References to security resources and documentation
- Compliance mapping to relevant standards (SOC2, PCI-DSS)
- Trend analysis compared to previous scans
**Integration Behavior:**
- Auto-trigger validation for high-risk operations
- Chain with execution: `scan --validate && command`
- Block execution for CRITICAL [10] severity issues
- Require explicit confirmation for HIGH [7-9] risks
- Log all scan results for audit and compliance
@include shared/security-patterns.yml#OWASP_Top_10
## Deliverables
- **Security Report**: Comprehensive vulnerability assessment
- **Risk Matrix**: Prioritized list of security issues
- **Remediation Guide**: Step-by-step fix instructions
- **Compliance Report**: Regulatory and standard compliance status
- **Trend Analysis**: Security posture improvement tracking
## Output Locations
- **Security Reports**: `.claudedocs/reports/security-scan-{timestamp}.md`
- **Validation Results**: `.claudedocs/reports/validation-{timestamp}.md`
- **Compliance Reports**: `.claudedocs/reports/compliance-{timestamp}.md`
- **Metrics**: `.claudedocs/metrics/security-metrics-{timestamp}.json`
**Reports:** `.claudedocs/scans/security-{timestamp}.md` | Severity classification | Fix recommendations | Risk assessment
## Research Requirements
External_Library_Research:
- Identify library/framework mentioned
- Context7 lookup for official documentation
- Verify API patterns and examples
- Check version compatibility
- Document findings in implementation
Pattern_Research:
- Search existing codebase for similar patterns
- Magic component search if UI-related
- WebSearch for official documentation
- Validate approach with Sequential thinking
- Document pattern choice rationale
API_Integration_Research:
- Official documentation lookup
- Authentication requirements
- Rate limiting and error handling
- SDK availability and examples
- Integration testing approach
**Fix Scripts:** Auto-generated patches | Safe automated fixes | Manual fix instructions | Rollback procedures
## Report Notifications
📄 Analysis report saved to: {path}
📊 Metrics updated: {path}
📋 Summary saved to: {path}
💾 Checkpoint created: {path}
📚 Documentation created: {path}
📁 Created directory: {path}
✅ {operation} completed successfully
❌ {operation} failed: {reason}
⚠ {operation} completed w/ warnings
**CI Integration:** Exit codes | JSON output | SARIF format | GitHub/GitLab integration
## Integration Patterns
**CI/CD Integration:**
- Fail builds on HIGH or CRITICAL security findings
- Generate security reports for each release
- Track security debt and improvement trends
- Automate security patch application
**Development Workflow:**
- Pre-commit hooks for quick security validation
- Pull request security gates
- Regular scheduled comprehensive scans
- Security review integration with code reviews
**Command Chaining:**
- `scan --validate` before `deploy` operations
- `scan --security --strict` for security audits
- `scan --deps` before `migrate` operations
- `scan --config` after `dev-setup` configuration
## Best Practices
**Regular Scanning:**
- Run validation before any risky operations
- Schedule weekly comprehensive security scans
- Implement automated dependency vulnerability monitoring
- Track and trend security findings over time
**Response Procedures:**
- Document exceptions with business justification
- Implement fix verification with re-scanning
- Maintain security issue tracking and resolution
- Regular security training and awareness programs
## Common Security Issues & Solutions
### SQL Injection Vulnerabilities
```bash
/scan --security --owasp "SQL injection patterns"
# → Identifies unsanitized database queries
# → Suggests parameterized query implementations
# → Validates input sanitization functions
```
### Dependency Vulnerabilities
```bash
/scan --deps --security --json
# → Scans package.json/requirements.txt for known CVEs
# → Provides upgrade paths for vulnerable dependencies
# → Generates automated security patch recommendations
```
### Configuration Security Issues
```bash
/scan --config --env --validate
# → Checks for exposed API keys and secrets
# → Validates SSL/TLS configuration
# → Reviews permission and access control settings
```
### OWASP Top 10 Compliance Check
```bash
/scan --owasp --comprehensive --report
# → Performs full OWASP Top 10 vulnerability assessment
# → Generates compliance report with remediation steps
# → Tracks progress against security benchmarks
```
## Troubleshooting
- **False Positives**: Use `--quick` for initial assessment, then `--comprehensive`
- **Complex Applications**: Apply `--think-hard` for thorough analysis
- **CI/CD Integration**: Use `--json` output for automated processing
- **Legacy Systems**: Combine `--security --deps --config` for complete assessment
## Success Messages
✅ {operation} completed successfully
📝 Created: {file_path}
✏ Updated: {file_path}
✨ Task completed: {task_title}
@include shared/universal-constants.yml#Success_Messages