Security Scanning
Identifies vulnerabilities in code and infrastructure using static analysis and automated scanning techniques.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add yonatangross-security-scanning npx -- -y @trustedskills/yonatangross-security-scanning
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"yonatangross-security-scanning": {
"command": "npx",
"args": [
"-y",
"@trustedskills/yonatangross-security-scanning"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill performs automated security scans on provided URLs or files. It identifies potential vulnerabilities and provides reports detailing findings, helping to proactively address security risks. The scan results can be used to improve overall system security posture and compliance.
When to use it
- Website Security Audit: Scan a website URL to identify common web application vulnerabilities before launch or during maintenance.
- File Analysis: Analyze uploaded files (e.g., scripts, configuration files) for potential security flaws.
- Pre-Deployment Checks: Integrate into a CI/CD pipeline to automatically scan code and infrastructure changes before deployment.
- Vulnerability Assessment: Regularly assess the security of existing systems and applications.
Key capabilities
- URL scanning
- File analysis
- Automated vulnerability detection
- Report generation
Example prompts
- "Scan this website for vulnerabilities: example.com"
- "Analyze this Python script for potential security issues."
- "Perform a security scan on the attached configuration file."
Tips & gotchas
The effectiveness of the scans depends on the type and complexity of the target being scanned. Be aware that some advanced or obfuscated vulnerabilities may not be detected by automated tools.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.