Openharmony Security Review
Helps with security, code review as part of implementing security and authentication workflows.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add openharmony-security-review npx -- -y @trustedskills/openharmony-security-review
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"openharmony-security-review": {
"command": "npx",
"args": [
"-y",
"@trustedskills/openharmony-security-review"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill performs automated security reviews specifically tailored for OpenHarmony-based systems. It analyzes codebases and configurations to identify vulnerabilities, ensuring compliance with the OpenHarmony security standards before deployment.
When to use it
- Before integrating third-party modules into an OpenHarmony application to prevent supply chain attacks.
- During the CI/CD pipeline to automatically flag insecure coding patterns in HarmonyOS projects.
- When preparing a device image for public release to verify adherence to platform security guidelines.
- To audit permission declarations and ensure minimal privilege escalation risks in system services.
Key capabilities
- Automated vulnerability detection within OpenHarmony codebases.
- Validation against specific OpenHarmony security compliance rules.
- Identification of insecure configuration settings in HarmonyOS environments.
- Reporting on potential privilege escalation vectors.
Example prompts
- "Run a full security review on my new OpenHarmony smart home application module."
- "Check this HarmonyOS project for common vulnerabilities and misconfigurations before I merge it."
- "Analyze the permission model in this system service to ensure it follows OpenHarmony best practices."
Tips & gotchas
Ensure your codebase is fully compatible with the current OpenHarmony version, as the review logic targets specific framework behaviors. This tool focuses on static analysis; it cannot detect runtime exploits or network-based attacks that require live testing environments.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.