Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 9 additions & 3 deletions plugins/sentry-skills/skills/security-review/SKILL.md
Original file line number Diff line number Diff line change
Expand Up @@ -209,12 +209,15 @@ os.system(f"cmd {user_input}") # Command injection

### Always Flag (Secrets)
```
password = "hardcoded"
password = "<hardcoded-value>"
api_key = "sk-..."
AWS_SECRET_ACCESS_KEY = "..."
private_key = "-----BEGIN"
```

> [!NOTE]
Comment thread
sentry[bot] marked this conversation as resolved.
> But NEVER leak exact hardcoded secret values to the report!

### Check Context First (MUST Investigate Before Flagging)
```
# SSRF - ONLY if URL is from user input, NOT from settings/config
Expand Down Expand Up @@ -242,7 +245,7 @@ random.random() for token # FLAG: Security tokens need secrets module

## Output Format

```markdown
~~~markdown
## Security Review: [File/Component Name]

### Summary
Expand All @@ -268,10 +271,13 @@ random.random() for token # FLAG: Security tokens need secrets module
#### [VERIFY-001] [Potential Issue]
- **Location**: `file.py:456`
- **Question**: [What needs to be verified]
```
~~~

If no vulnerabilities found, state: "No high-confidence vulnerabilities identified."

> [!NOTE]
> Ensure "[Vulnerable code snippet]" doesn't contain exact values of hardcoded secrets. They MUST be masked or redacted in the report.

---

## Reference Files
Expand Down