- Removed references to validate-references.sh from YAML files - Removed expand-references.sh from settings.local.json - Cleaned up @pattern/@flags references from shared files - Updated documentation to reflect current no-code implementation - Simplified reference-index.yml to remove @include patterns This cleanup removes confusion from the abandoned pattern reference system while maintaining all functionality. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
13 KiB
/scan - Perform security and validation scans
Legend
| Symbol | Meaning | Abbrev | Meaning | |
|---|---|---|---|---|
| → | leads to | cfg | configuration | |
| & | and/with | impl | implementation | |
| w/ | with | perf | performance | |
| @ | at/located | ops | operations | |
| > | greater than | val | validation | |
| ∀ | for all/every | req | requirements | |
| ∃ | exists/there is | deps | dependencies | |
| ∴ | therefore | env | environment | |
| ∵ | because | db | database | |
| ≡ | equivalent | api | interface | |
| ≈ | approximately | docs | documentation | |
| 📁 | directory/path | std | standard | |
| 🔢 | number/count | def | default | |
| 📝 | text/string | ctx | context | |
| ⚙ | setting/config | err | error | |
| 🎛 | control/flags | exec | execution | |
| 🔧 | configuration | qual | quality | |
| 📋 | group/category | rec | recovery | |
| 🚨 | critical/urgent | sev | severity | |
| ⚠ | warning/caution | resp | response | |
| 🔄 | retry/recovery | esc | escalation | |
| ✅ | success/fixed | tok | token | |
| ❌ | failure/error | opt | optimization | |
| ℹ | information | UX | user experience | |
| ⚡ | fast/quick | UI | user interface | |
| 🐌 | slow/delayed | C | critical | |
| ✨ | complete/done | H | high | |
| 📖 | read operation | M | medium | |
| ✏ | edit operation | L | low | |
| 🗑 | delete operation |
Purpose
Perform comprehensive security and validation scans on code, operations, or systems specified in $ARGUMENTS to identify vulnerabilities and safety issues.
Syntax
/scan [flags] [target]
Universal Flags
--plan: "Show execution plan before running" --uc: "UltraCompressed mode (~70% token reduction)" --ultracompressed: "Alias for --uc" --think: "Multi-file analysis w/ context (4K tokens)" --think-hard: "Deep architectural analysis (10K tokens)" --ultrathink: "Critical system redesign (32K tokens)" --c7: "Enable Context7→library documentation lookup" --seq: "Enable Sequential→complex analysis & thinking" --magic: "Enable Magic→UI component generation" --pup: "Enable Puppeteer→browser automation & testing" --all-mcp: "Enable all MCP servers" --no-mcp: "Disable all MCP servers (native tools only)" --no-c7: "Disable Context7 specifically" --no-seq: "Disable Sequential thinking specifically" --no-magic: "Disable Magic UI builder specifically" --no-pup: "Disable Puppeteer specifically"
Command-Specific Flags
Scan Types:
--validate: Pre-execution safety validation and risk assessment--security: Comprehensive security analysis and vulnerability scanning--owasp: Focus on OWASP Top 10 security risks--deps: Dependency vulnerability and license scanning--config: Configuration security and compliance checking
Scan Depth:
--quick: Fast validation for common issues with rapid feedback--comprehensive: Deep analysis covering all security aspects--strict: Zero-tolerance mode flagging all potential issues
Specialized Scans:
--infrastructure: Infrastructure and deployment security--code: Source code security analysis--data: Data protection and privacy compliance--network: Network security and exposure analysis
Output Control:
--report: Generate detailed security report--json: Output results in JSON format for automation--summary: Provide executive summary with key findings
Examples
/scan --validate --quick→ Fast pre-execution safety check/scan --security --owasp --comprehensive→ Complete OWASP security audit/scan --deps --strict --report→ Dependency scan with detailed report/scan --validate --security --think→ Combined validation and security with analysis/scan --infrastructure --config --json→ Infrastructure security in JSON format
Validation Mode (--validate)
Pre-Execution Safety Checks:
Security Validation:
- Path traversal prevention and boundary enforcement
- Secrets and credentials detection in code
- Permission verification and access control
- Input sanitization and validation checks
- Output encoding and XSS prevention
Code Validation:
- Syntax correctness and compilation checks
- Import and dependency verification
- Breaking change detection and compatibility
- Configuration validity and completeness
- Type safety and null pointer checks
Operation Validation:
- Git repository state verification
- Branch protection compliance
- Resource availability and capacity
- Rollback capability assessment
- Blast radius and impact analysis
Risk Assessment Framework:
- Calculate comprehensive risk score (1-10)
- Impact analysis (data loss, downtime, security)
- Reversibility and recovery evaluation
- Required permissions and access verification
- Compliance and regulatory checks
Validation Workflow:
- Parse and analyze intended operation
- Run all applicable safety checks
- Generate risk score and impact assessment
- Report with clear status indicators:
- ✅ Pass: Safe to proceed without concerns
- ⚠️ Warning: Caution advised, review recommended
- ❌ Block: Do not proceed, issues must be resolved
Security Mode (--security)
OWASP Top 10 Analysis:
- Injection Flaws: SQL, NoSQL, OS command, LDAP injection detection
- Broken Authentication: Session management and auth weakness detection
- Sensitive Data Exposure: Data protection and encryption analysis
- XML External Entities (XXE): XML processing vulnerability detection
- Broken Access Control: Authorization and privilege escalation issues
- Security Misconfiguration: Configuration hardening assessment
- Cross-Site Scripting (XSS): XSS vulnerability detection and prevention
- Insecure Deserialization: Object deserialization security analysis
- Known Vulnerable Components: Dependency vulnerability scanning
- Insufficient Logging: Security monitoring and audit trail analysis
Code Security Analysis:
- Input validation gaps and boundary checks
- Output encoding issues and data sanitization
- Authentication mechanism weaknesses
- Authorization logic flaws and privilege escalation
- Cryptographic implementation problems
- Error handling information leakage
- Session management security issues
- File operation safety and path traversal
Dependency Security Scanning:
- Known CVE (Common Vulnerabilities and Exposures) detection
- Outdated package identification with security implications
- License compliance and legal risk assessment
- Transitive dependency vulnerability analysis
- Security patch availability and update recommendations
- Typosquatting and malicious package detection
Configuration Security:
- Hardcoded secrets and credentials scanning
- Environment variable security assessment
- File and directory permission configurations
- Network exposure and attack surface analysis
- TLS/SSL configuration and certificate validation
- CORS policies and cross-origin security
- Security headers implementation verification
Infrastructure Security:
- Open ports and unnecessary services identification
- Firewall rules and network segmentation
- Access control lists and identity management
- Encryption in transit and at rest verification
- Backup security and disaster recovery assessment
- Logging configuration and audit trail analysis
Scan Execution Modes
Quick Scan (--quick):
- Focus on most critical and common vulnerabilities
- Skip time-intensive deep analysis procedures
- Prioritize immediate security concerns
- Provide rapid feedback for development workflow
- Suitable for pre-commit hooks and fast CI/CD
Comprehensive Scan (--comprehensive):
- Complete security analysis across all categories
- Deep dive into complex security patterns
- Thorough dependency and configuration analysis
- Detailed threat modeling and risk assessment
- Suitable for periodic security audits
Strict Mode (--strict):
- Zero-tolerance approach to security issues
- Flag all potential security concerns
- Enforce industry best practices and standards
- Require explicit overrides for any findings
- Suitable for high-security environments
Scan Results and Reporting
Security Findings Classification:
- CRITICAL [10]: Immediate action required, system at risk
- HIGH [7-9]: Fix before deployment, significant security risk
- MEDIUM [4-6]: Address in next development cycle
- LOW [1-3]: Best practice improvements, technical debt
Report Contents:
- Executive summary with overall risk assessment
- Detailed findings categorized by security domain
- Specific remediation steps with code examples
- References to security resources and documentation
- Compliance mapping to relevant standards (SOC2, PCI-DSS)
- Trend analysis compared to previous scans
Integration Behavior:
- Auto-trigger validation for high-risk operations
- Chain with execution:
scan --validate && command - Block execution for CRITICAL [10] severity issues
- Require explicit confirmation for HIGH [7-9] risks
- Log all scan results for audit and compliance
Deliverables
- Security Report: Comprehensive vulnerability assessment
- Risk Matrix: Prioritized list of security issues
- Remediation Guide: Step-by-step fix instructions
- Compliance Report: Regulatory and standard compliance status
- Trend Analysis: Security posture improvement tracking
Output Locations
- Security Reports:
.claudedocs/reports/security-scan-{timestamp}.md - Validation Results:
.claudedocs/reports/validation-{timestamp}.md - Compliance Reports:
.claudedocs/reports/compliance-{timestamp}.md - Metrics:
.claudedocs/metrics/security-metrics-{timestamp}.json
Research Requirements
External_Library_Research:
- Identify library/framework mentioned
- Context7 lookup for official documentation
- Verify API patterns and examples
- Check version compatibility
- Document findings in implementation Pattern_Research:
- Search existing codebase for similar patterns
- Magic component search if UI-related
- WebSearch for official documentation
- Validate approach with Sequential thinking
- Document pattern choice rationale API_Integration_Research:
- Official documentation lookup
- Authentication requirements
- Rate limiting and error handling
- SDK availability and examples
- Integration testing approach
Report Notifications
📄 Analysis report saved to: {path} 📊 Metrics updated: {path} 📋 Summary saved to: {path} 💾 Checkpoint created: {path} 📚 Documentation created: {path} 📁 Created directory: {path} ✅ {operation} completed successfully ❌ {operation} failed: {reason} ⚠ {operation} completed w/ warnings
Integration Patterns
CI/CD Integration:
- Fail builds on HIGH or CRITICAL security findings
- Generate security reports for each release
- Track security debt and improvement trends
- Automate security patch application
Development Workflow:
- Pre-commit hooks for quick security validation
- Pull request security gates
- Regular scheduled comprehensive scans
- Security review integration with code reviews
Command Chaining:
scan --validatebeforedeployoperationsscan --security --strictfor security auditsscan --depsbeforemigrateoperationsscan --configafterdev-setupconfiguration
Best Practices
Regular Scanning:
- Run validation before any risky operations
- Schedule weekly comprehensive security scans
- Implement automated dependency vulnerability monitoring
- Track and trend security findings over time
Response Procedures:
- Document exceptions with business justification
- Implement fix verification with re-scanning
- Maintain security issue tracking and resolution
- Regular security training and awareness programs
Common Security Issues & Solutions
SQL Injection Vulnerabilities
/scan --security --owasp "SQL injection patterns"
# → Identifies unsanitized database queries
# → Suggests parameterized query implementations
# → Validates input sanitization functions
Dependency Vulnerabilities
/scan --deps --security --json
# → Scans package.json/requirements.txt for known CVEs
# → Provides upgrade paths for vulnerable dependencies
# → Generates automated security patch recommendations
Configuration Security Issues
/scan --config --env --validate
# → Checks for exposed API keys and secrets
# → Validates SSL/TLS configuration
# → Reviews permission and access control settings
OWASP Top 10 Compliance Check
/scan --owasp --comprehensive --report
# → Performs full OWASP Top 10 vulnerability assessment
# → Generates compliance report with remediation steps
# → Tracks progress against security benchmarks
Troubleshooting
- False Positives: Use
--quickfor initial assessment, then--comprehensive - Complex Applications: Apply
--think-hardfor thorough analysis - CI/CD Integration: Use
--jsonoutput for automated processing - Legacy Systems: Combine
--security --deps --configfor complete assessment
Success Messages
✅ {operation} completed successfully 📝 Created: {file_path} ✏ Updated: {file_path} ✨ Task completed: {task_title}