Security Checklist
Automates security checklist completion, identifying vulnerabilities and ensuring compliance based on leavesfly's best practices.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add leavesfly-security-checklist npx -- -y @trustedskills/leavesfly-security-checklist
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"leavesfly-security-checklist": {
"command": "npx",
"args": [
"-y",
"@trustedskills/leavesfly-security-checklist"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The leavesfly-security-checklist skill provides a structured checklist to evaluate and improve the security posture of systems or applications. It helps identify potential vulnerabilities by guiding users through common security considerations, ensuring a more thorough assessment. This skill aims to reduce risk and enhance overall system resilience.
When to use it
- New Project Setup: Use this checklist when initiating a new project to proactively incorporate security best practices from the beginning.
- Security Audits: Integrate the checklist into regular security audit processes for ongoing assessment of existing systems.
- Post-Incident Review: Employ the checklist after a security incident to identify gaps and prevent recurrence.
- Compliance Checks: Utilize it as part of compliance efforts, ensuring adherence to relevant security standards.
Key capabilities
- Provides a structured security checklist.
- Helps identify potential vulnerabilities.
- Supports proactive security measures.
- Aids in risk reduction.
Example prompts
- "Run the security checklist for my web application."
- "Generate a security assessment based on the leavesfly-security-checklist."
- "What are the key areas covered by the security checklist?"
Tips & gotchas
This skill assumes some basic understanding of security concepts. The checklist is intended as a guide and may need to be adapted based on the specific context and requirements of your system.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.