security-scanning-security-hardening

22
0
Source

Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.

Install

mkdir -p .claude/skills/security-scanning-security-hardening && curl -L -o skill.zip "https://mcp.directory/api/skills/download/1488" && unzip -o skill.zip -d .claude/skills/security-scanning-security-hardening && rm skill.zip

Installs to .claude/skills/security-scanning-security-hardening

About this skill

Implement comprehensive security hardening with defense-in-depth strategy through coordinated multi-agent orchestration:

[Extended thinking: This workflow implements a defense-in-depth security strategy across all application layers. It coordinates specialized security agents to perform comprehensive assessments, implement layered security controls, and establish continuous security monitoring. The approach follows modern DevSecOps principles with shift-left security, automated scanning, and compliance validation. Each phase builds upon previous findings to create a resilient security posture that addresses both current vulnerabilities and future threats.]

Use this skill when

  • Running a coordinated security hardening program
  • Establishing defense-in-depth controls across app, infra, and CI/CD
  • Prioritizing remediation from scans and threat modeling

Do not use this skill when

  • You only need a quick scan without remediation work
  • You lack authorization for security testing or changes
  • The environment cannot tolerate invasive security controls

Instructions

  1. Execute Phase 1 to establish a security baseline.
  2. Apply Phase 2 remediations for high-risk issues.
  3. Implement Phase 3 controls and validate defenses.
  4. Complete Phase 4 validation and compliance checks.

Safety

  • Avoid intrusive testing in production without approval.
  • Ensure rollback plans exist before hardening changes.

Phase 1: Comprehensive Security Assessment

1. Initial Vulnerability Scanning

  • Use Task tool with subagent_type="security-auditor"
  • Prompt: "Perform comprehensive security assessment on: $ARGUMENTS. Execute SAST analysis with Semgrep/SonarQube, DAST scanning with OWASP ZAP, dependency audit with Snyk/Trivy, secrets detection with GitLeaks/TruffleHog. Generate SBOM for supply chain analysis. Identify OWASP Top 10 vulnerabilities, CWE weaknesses, and CVE exposures."
  • Output: Detailed vulnerability report with CVSS scores, exploitability analysis, attack surface mapping, secrets exposure report, SBOM inventory
  • Context: Initial baseline for all remediation efforts

2. Threat Modeling and Risk Analysis

  • Use Task tool with subagent_type="security-auditor"
  • Prompt: "Conduct threat modeling using STRIDE methodology for: $ARGUMENTS. Analyze attack vectors, create attack trees, assess business impact of identified vulnerabilities. Map threats to MITRE ATT&CK framework. Prioritize risks based on likelihood and impact."
  • Output: Threat model diagrams, risk matrix with prioritized vulnerabilities, attack scenario documentation, business impact analysis
  • Context: Uses vulnerability scan results to inform threat priorities

3. Architecture Security Review

  • Use Task tool with subagent_type="backend-api-security::backend-architect"
  • Prompt: "Review architecture for security weaknesses in: $ARGUMENTS. Evaluate service boundaries, data flow security, authentication/authorization architecture, encryption implementation, network segmentation. Design zero-trust architecture patterns. Reference threat model and vulnerability findings."
  • Output: Security architecture assessment, zero-trust design recommendations, service mesh security requirements, data classification matrix
  • Context: Incorporates threat model to address architectural vulnerabilities

Phase 2: Vulnerability Remediation

4. Critical Vulnerability Fixes

  • Use Task tool with subagent_type="security-auditor"
  • Prompt: "Coordinate immediate remediation of critical vulnerabilities (CVSS 7+) in: $ARGUMENTS. Fix SQL injections with parameterized queries, XSS with output encoding, authentication bypasses with secure session management, insecure deserialization with input validation. Apply security patches for CVEs."
  • Output: Patched code with vulnerability fixes, security patch documentation, regression test requirements
  • Context: Addresses high-priority items from vulnerability assessment

5. Backend Security Hardening

  • Use Task tool with subagent_type="backend-api-security::backend-security-coder"
  • Prompt: "Implement comprehensive backend security controls for: $ARGUMENTS. Add input validation with OWASP ESAPI, implement rate limiting and DDoS protection, secure API endpoints with OAuth2/JWT validation, add encryption for data at rest/transit using AES-256/TLS 1.3. Implement secure logging without PII exposure."
  • Output: Hardened API endpoints, validation middleware, encryption implementation, secure configuration templates
  • Context: Builds upon vulnerability fixes with preventive controls

6. Frontend Security Implementation

  • Use Task tool with subagent_type="frontend-mobile-security::frontend-security-coder"
  • Prompt: "Implement frontend security measures for: $ARGUMENTS. Configure CSP headers with nonce-based policies, implement XSS prevention with DOMPurify, secure authentication flows with PKCE OAuth2, add SRI for external resources, implement secure cookie handling with SameSite/HttpOnly/Secure flags."
  • Output: Secure frontend components, CSP policy configuration, authentication flow implementation, security headers configuration
  • Context: Complements backend security with client-side protections

7. Mobile Security Hardening

  • Use Task tool with subagent_type="frontend-mobile-security::mobile-security-coder"
  • Prompt: "Implement mobile app security for: $ARGUMENTS. Add certificate pinning, implement biometric authentication, secure local storage with encryption, obfuscate code with ProGuard/R8, implement anti-tampering and root/jailbreak detection, secure IPC communications."
  • Output: Hardened mobile application, security configuration files, obfuscation rules, certificate pinning implementation
  • Context: Extends security to mobile platforms if applicable

Phase 3: Security Controls Implementation

8. Authentication and Authorization Enhancement

  • Use Task tool with subagent_type="security-auditor"
  • Prompt: "Implement modern authentication system for: $ARGUMENTS. Deploy OAuth2/OIDC with PKCE, implement MFA with TOTP/WebAuthn/FIDO2, add risk-based authentication, implement RBAC/ABAC with principle of least privilege, add session management with secure token rotation."
  • Output: Authentication service configuration, MFA implementation, authorization policies, session management system
  • Context: Strengthens access controls based on architecture review

9. Infrastructure Security Controls

  • Use Task tool with subagent_type="deployment-strategies::deployment-engineer"
  • Prompt: "Deploy infrastructure security controls for: $ARGUMENTS. Configure WAF rules for OWASP protection, implement network segmentation with micro-segmentation, deploy IDS/IPS systems, configure cloud security groups and NACLs, implement DDoS protection with rate limiting and geo-blocking."
  • Output: WAF configuration, network security policies, IDS/IPS rules, cloud security configurations
  • Context: Implements network-level defenses

10. Secrets Management Implementation

  • Use Task tool with subagent_type="deployment-strategies::deployment-engineer"
  • Prompt: "Implement enterprise secrets management for: $ARGUMENTS. Deploy HashiCorp Vault or AWS Secrets Manager, implement secret rotation policies, remove hardcoded secrets, configure least-privilege IAM roles, implement encryption key management with HSM support."
  • Output: Secrets management configuration, rotation policies, IAM role definitions, key management procedures
  • Context: Eliminates secrets exposure vulnerabilities

Phase 4: Validation and Compliance

11. Penetration Testing and Validation

  • Use Task tool with subagent_type="security-auditor"
  • Prompt: "Execute comprehensive penetration testing for: $ARGUMENTS. Perform authenticated and unauthenticated testing, API security testing, business logic testing, privilege escalation attempts. Use Burp Suite, Metasploit, and custom exploits. Validate all security controls effectiveness."
  • Output: Penetration test report, proof-of-concept exploits, remediation validation, security control effectiveness metrics
  • Context: Validates all implemented security measures

12. Compliance and Standards Verification

  • Use Task tool with subagent_type="security-auditor"
  • Prompt: "Verify compliance with security frameworks for: $ARGUMENTS. Validate against OWASP ASVS Level 2, CIS Benchmarks, SOC2 Type II requirements, GDPR/CCPA privacy controls, HIPAA/PCI-DSS if applicable. Generate compliance attestation reports."
  • Output: Compliance assessment report, gap analysis, remediation requirements, audit evidence collection
  • Context: Ensures regulatory and industry standard compliance

13. Security Monitoring and SIEM Integration

  • Use Task tool with subagent_type="incident-response::devops-troubleshooter"
  • Prompt: "Implement security monitoring and SIEM for: $ARGUMENTS. Deploy Splunk/ELK/Sentinel integration, configure security event correlation, implement behavioral analytics for anomaly detection, set up automated incident response playbooks, create security dashboards and alerting."
  • Output: SIEM configuration, correlation rules, incident response playbooks, security dashboards, alert definitions
  • Context: Establishes continuous security monitoring

Configuration Options

  • scanning_depth: "quick" | "standard" | "comprehensive" (default: comprehensive)
  • compliance_frameworks: ["OWASP", "CIS", "SOC2", "GDPR", "HIPAA", "PCI-DSS"]
  • remediation_priority: "cvss_score" | "exploitability" | "business_impact"
  • monitoring_integration: "splunk" | "elastic" | "sentinel" | "custom"
  • authentication_methods: ["oauth2", "saml", "mfa", "biometric", "passwordless"]

Success Criteria

  • All critical vulnerabilities (CVSS 7+) remediated
  • OWASP Top 10 vulnerabilities addressed
  • Zero high-risk findings in penetration testing
  • Compliance frameworks validation passed
  • Security monitoring detecting and alerting on threats
  • Incident response time < 15 minutes for critical alerts
  • SBOM generated and vulnerabilities tracked
  • All secrets managed through secure vault
  • Authentication implements MFA and secure session management
  • Security tests integrated into CI/CD pipeline

Coordination Notes

  • Each phase provides detailed findings that inform subsequent phases
  • Security-auditor agent coordinates with domain-specific agents for fixes
  • All code changes undergo security review before implementation
  • Continuous feedback loop between assessment and remediation
  • Security findings tracked in centralized vulnerability management system
  • Regular security reviews scheduled post-implementation

Security hardening target: $ARGUMENTS

More by sickn33

View all →

mobile-design

sickn33

Mobile-first design and engineering doctrine for iOS and Android apps. Covers touch interaction, performance, platform conventions, offline behavior, and mobile-specific decision-making. Teaches principles and constraints, not fixed layouts. Use for React Native, Flutter, or native mobile apps.

5233

unity-developer

sickn33

Build Unity games with optimized C# scripts, efficient rendering, and proper asset management. Masters Unity 6 LTS, URP/HDRP pipelines, and cross-platform deployment. Handles gameplay systems, UI implementation, and platform optimization. Use PROACTIVELY for Unity performance issues, game mechanics, or cross-platform builds.

5116

fastapi-pro

sickn33

Build high-performance async APIs with FastAPI, SQLAlchemy 2.0, and Pydantic V2. Master microservices, WebSockets, and modern Python async patterns. Use PROACTIVELY for FastAPI development, async optimization, or API architecture.

5114

frontend-slides

sickn33

Create stunning, animation-rich HTML presentations from scratch or by converting PowerPoint files. Use when the user wants to build a presentation, convert a PPT/PPTX to web, or create slides for a talk/pitch. Helps non-designers discover their aesthetic through visual exploration rather than abstract choices.

5514

flutter-expert

sickn33

Master Flutter development with Dart 3, advanced widgets, and multi-platform deployment. Handles state management, animations, testing, and performance optimization for mobile, web, desktop, and embedded platforms. Use PROACTIVELY for Flutter architecture, UI implementation, or cross-platform features.

339

threejs-skills

sickn33

Three.js skills for creating 3D elements and interactive experiences

476

You might also like

flutter-development

aj-geddes

Build beautiful cross-platform mobile apps with Flutter and Dart. Covers widgets, state management with Provider/BLoC, navigation, API integration, and material design.

272785

drawio-diagrams-enhanced

jgtolentino

Create professional draw.io (diagrams.net) diagrams in XML format (.drawio files) with integrated PMP/PMBOK methodologies, extensive visual asset libraries, and industry-standard professional templates. Use this skill when users ask to create flowcharts, swimlane diagrams, cross-functional flowcharts, org charts, network diagrams, UML diagrams, BPMN, project management diagrams (WBS, Gantt, PERT, RACI), risk matrices, stakeholder maps, or any other visual diagram in draw.io format. This skill includes access to custom shape libraries for icons, clipart, and professional symbols.

203415

godot

bfollington

This skill should be used when working on Godot Engine projects. It provides specialized knowledge of Godot's file formats (.gd, .tscn, .tres), architecture patterns (component-based, signal-driven, resource-based), common pitfalls, validation tools, code templates, and CLI workflows. The `godot` command is available for running the game, validating scripts, importing resources, and exporting builds. Use this skill for tasks involving Godot game development, debugging scene/resource files, implementing game systems, or creating new Godot components.

196279

nano-banana-pro

garg-aayush

Generate and edit images using Google's Nano Banana Pro (Gemini 3 Pro Image) API. Use when the user asks to generate, create, edit, modify, change, alter, or update images. Also use when user references an existing image file and asks to modify it in any way (e.g., "modify this image", "change the background", "replace X with Y"). Supports both text-to-image generation and image-to-image editing with configurable resolution (1K default, 2K, or 4K for high resolution). DO NOT read the image file first - use this skill directly with the --input-image parameter.

209231

ui-ux-pro-max

nextlevelbuilder

"UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient."

167197

rust-coding-skill

UtakataKyosui

Guides Claude in writing idiomatic, efficient, well-structured Rust code using proper data modeling, traits, impl organization, macros, and build-speed best practices.

164173

Stay ahead of the MCP ecosystem

Get weekly updates on new skills and servers.