agent/codex/review/commands/security.md
Snider 466fe9f5a6 feat(codex): mirror claude plugins and ethics modal
Summary:\n- added Codex marketplace registry plus awareness/ethics/guardrails sub-plugins\n- mirrored Claude plugin commands/scripts/hooks into codex api/ci/code/collect/coolify/core/issue/perf/qa/review/verify\n- embedded Axioms of Life ethics modal, guardrails, and kernel files under codex/ethics\n- added Codex parity report, improvements list, and MCP integration plan\n- extended Gemini MCP tools and docs for Codex awareness
2026-02-05 20:13:01 +00:00

1.6 KiB

name description args
security Security-focused code review
commit-range|--pr=N

Security Review

Perform a security-focused code review.

Focus Areas

1. Injection Vulnerabilities

  • SQL injection
  • Command injection
  • XSS (Cross-Site Scripting)
  • LDAP injection
  • XML injection

2. Authentication & Authorisation

  • Hardcoded credentials
  • Weak password handling
  • Missing auth checks
  • Privilege escalation paths

3. Data Exposure

  • Sensitive data in logs
  • PII in error messages
  • Secrets in version control
  • Insecure data transmission

4. Cryptography

  • Weak algorithms (MD5, SHA1 for security)
  • Hardcoded keys/IVs
  • Insecure random number generation

5. Dependencies

  • Known vulnerable packages
  • Outdated dependencies

Process

  1. Get diff for specified range
  2. Scan for security patterns
  3. Check for common vulnerabilities
  4. Report findings with severity

Patterns to Check

Go

// SQL injection
db.Query("SELECT * FROM users WHERE id = " + id)

// Command injection
exec.Command("bash", "-c", userInput)

// Hardcoded secrets
apiKey := "sk_live_..."

PHP

// SQL injection
$db->query("SELECT * FROM users WHERE id = $id");

// XSS
echo $request->input('name');

// Command injection
shell_exec($userInput);

Output Format

## Security Review

### Critical
- **file:line** - SQL Injection: User input directly in query

### High
- **file:line** - Hardcoded API key detected

### Medium
- **file:line** - Missing CSRF protection

### Low
- **file:line** - Debug endpoint exposed

---
**Summary**: X critical, Y high, Z medium, W low