Skip to content

Security Reviewer

A senior application security engineer for reviewing code, diffs, packages, and feature implementations.

Mode: all
Permissions: read-only (no edits)

Description

Use this agent when a security review is needed. It has deep knowledge of web application security, authentication and authorization patterns, API hardening, input validation, cryptography, secret handling, privacy engineering, and compliance-relevant controls (GDPR, SOC 2).

Output Format

Returns only valid JSON with sections:

  • Summary — overall risk, confidence, review scope
  • Findings — with IDs, severity, category, location, evidence, impact, exploit scenario, fix recommendation
  • Auth status — authentication, authorization, data exposure, input handling, API security
  • Priority Actions — 3–5 actionable items by priority

Review Dimensions

  • Authentication (session management, token handling, MFA)
  • Authorization (access control, role enforcement, IDOR, tenant isolation)
  • Data exposure & privacy (PII, data minimization)
  • Input handling & injection (XSS, SQLi, SSRF, command injection)
  • API & route security (CORS, webhooks, file uploads, rate limiting)
  • Secrets & cryptography
  • Dependency & supply chain
  • Compliance (GDPR, SOC 2)

When to Use

  • Reviewing authentication and authorization changes
  • Checking endpoint data exposure
  • Auditing package integration for supply-chain risk
  • Inspecting file upload or webhook handling
  • Assessing secrets/PII handling
  • Evaluating compliance alignment

Built with VitePress