Security Scanner
Identifies potential vulnerabilities and insecure coding practices in creator projects using automated security analysis.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add famaoai-creator-security-scanner npx -- -y @trustedskills/famaoai-creator-security-scanner
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"famaoai-creator-security-scanner": {
"command": "npx",
"args": [
"-y",
"@trustedskills/famaoai-creator-security-scanner"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill performs security scans on provided URLs, identifying potential vulnerabilities and risks. It analyzes web pages to detect common issues like cross-site scripting (XSS), SQL injection, and other OWASP Top 10 threats. The results are presented in a structured format highlighting the identified problems and providing recommendations for remediation.
When to use it
- Website Security Audits: Regularly scan your websites or those of clients to proactively identify vulnerabilities before they can be exploited.
- Penetration Testing Support: Use as part of a broader penetration testing process to automate initial vulnerability discovery.
- Code Review Assistance: Integrate into code review workflows to automatically flag potential security flaws in web applications.
- Security Awareness Training: Demonstrate common vulnerabilities and educate developers on secure coding practices.
Key capabilities
- URL scanning for common web vulnerabilities
- Identification of XSS, SQL injection, and OWASP Top 10 threats
- Structured reporting of identified issues with remediation recommendations
Example prompts
- "Scan the website
https://example.comfor security vulnerabilities." - "Perform a security scan on
https://mywebapp.test/loginand report any potential XSS risks." - "Analyze
https://vulnerable-site.organd identify SQL injection vulnerabilities."
Tips & gotchas
The skill's effectiveness depends on the accuracy of its vulnerability detection algorithms, which may not cover all possible attack vectors. Always combine automated scanning with manual security reviews for comprehensive assessments.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.