ln-760-security-setup
Scannednpx machina-cli add skill levnikolaevich/claude-code-skills/ln-760-security-setup --openclawPaths: File paths (
shared/,references/,../ln-*) are relative to skills repo root. If not found at CWD, locate this SKILL.md directory and go up one level for repo root.
Security Setup Coordinator
L2 Domain Coordinator that orchestrates security scanning and configuration for project bootstrap.
Purpose & Scope
- Coordinate secret scanning (ln-761) and dependency vulnerability audit (ln-625)
- Aggregate findings from both workers into unified report
- Generate security infrastructure: SECURITY.md, pre-commit hooks, CI workflow
- Provide overall security score and risk assessment
When to Use
- During project bootstrap (invoked by ln-700-project-bootstrap)
- Manual security audit request
- CI/CD pipeline initialization
Workflow
Phase 1: Pre-flight Check
Step 1: Detect Project Type
- Identify primary ecosystem(s): Node.js, .NET, Python, Go, etc.
- Check for existing security configs (
.gitleaks.toml,SECURITY.md)
Step 2: Check Tool Availability
- Verify gitleaks/trufflehog available for secret scanning
- Verify ecosystem-specific audit tools available
- Log warnings for missing tools (do not fail)
Step 3: Load Existing Configs
- If
.gitleaks.tomlexists: note for preservation - If
SECURITY.mdexists: note for update (not overwrite) - If
.pre-commit-config.yamlexists: check for gitleaks hook
Phase 2: Delegate Scans
Step 1: Invoke ln-761 Secret Scanner
- Delegate via Task tool
- Receive: findings list, severity summary, remediation guidance
Step 2: Invoke ln-625 Dependencies Auditor (mode=vulnerabilities_only)
- Delegate via Task tool (can run parallel with Step 1)
- Pass parameter:
mode=vulnerabilities_only - Receive: vulnerability list, CVSS scores, fix recommendations
Phase 3: Aggregate Reports
Step 1: Combine Findings
- Merge findings from both workers
- Group by severity (Critical first)
- Calculate overall security score
Step 2: Risk Assessment
- Critical findings: flag for immediate attention
- High findings: recommend fix within 48h
- Medium/Low: add to backlog
Step 3: Build Summary
- Files scanned count
- Secrets found (by severity)
- Vulnerabilities found (by severity)
- Overall pass/warn/fail status
Phase 4: Generate Outputs
Step 1: Create/Update SECURITY.md
- Use template from
references/security_md_template.md - If exists: update, preserve custom sections
- If new: generate with placeholders
Step 2: Configure Pre-commit Hooks
- If
.pre-commit-config.yamlmissing: create from template - If exists without gitleaks: recommend adding
- Template:
references/precommit_config_template.yaml
Step 3: Generate CI Workflow
- If
.github/workflows/security.ymlmissing: create from template - Template:
references/ci_workflow_template.yaml - Include ecosystem-specific audit jobs
Step 4: Update .gitignore
- Ensure secret-related patterns present:
.env,.env.*,!.env.example*.pem,*.key
- Preserve existing entries
Delegation Pattern
CRITICAL: All delegations use Task tool with
subagent_type: "general-purpose"for context isolation.
| Worker | Parallel | Purpose |
|---|---|---|
| ln-761-secret-scanner | Yes | Hardcoded secret detection |
| ln-625-dependencies-auditor | Yes | Vulnerability scanning (mode=vulnerabilities_only) |
Prompt template:
Task(description: "Secret scanning via ln-761",
prompt: "Execute ln-761-secret-scanner. Read skill from ln-761-secret-scanner/SKILL.md. Project: {projectPath}",
subagent_type: "general-purpose")
Task(description: "Dependency vulnerability scan via ln-625",
prompt: "Execute ln-625-dependencies-auditor with mode=vulnerabilities_only. Read skill from ln-625-dependencies-auditor/SKILL.md. Project: {projectPath}. Mode: vulnerabilities_only (only CVE scan, skip outdated/unused checks).",
subagent_type: "general-purpose")
Pattern: Both workers can execute in parallel via Task tool, then aggregate results.
Anti-Patterns:
- ❌ Direct Skill tool invocation without Task wrapper
- ❌ Any execution bypassing subagent context isolation
- ❌ Calling ln-625 without mode parameter (would run full audit)
Definition of Done
- Both workers (ln-761, ln-625) invoked and completed
- Findings aggregated with severity classification
- SECURITY.md created/updated
- Pre-commit hook configured (or recommendation logged)
- CI workflow generated (or recommendation logged)
- .gitignore updated with secret patterns
- Summary report returned to parent orchestrator
Reference Files
| File | Purpose |
|---|---|
references/security_md_template.md | Template for SECURITY.md generation |
references/precommit_config_template.yaml | Pre-commit hooks configuration |
references/ci_workflow_template.yaml | GitHub Actions security workflow |
Critical Rules
- Always pass
mode=vulnerabilities_onlyto ln-625 — full audit mode is not appropriate for bootstrap context - Preserve existing configs — if
.gitleaks.toml,SECURITY.md, or.pre-commit-config.yamlexist, update rather than overwrite - Use Task tool with
subagent_type: "general-purpose"for all worker delegations (context isolation) - Never fail on missing tools — log warnings for unavailable scanners, continue with available ones
- Critical findings block completion — flag for immediate attention before returning to parent
Version: 3.0.0 Last Updated: 2026-02-05
Source
git clone https://github.com/levnikolaevich/claude-code-skills/blob/master/ln-760-security-setup/SKILL.mdView on GitHub Overview
ln-760 coordinates secret scanning (ln-761) and dependency vulnerability auditing (ln-625) during project bootstrap. It aggregates findings into a unified report and generates security infrastructure, including SECURITY.md, pre-commit hooks, and a CI workflow. The coordinator also provides an overall security score and risk assessment to guide remediation.
How This Skill Works
Operates in four phases: pre-flight checks, delegation, aggregation, and output generation. It detects project type, verifies tooling, and loads existing configs, then delegates to ln-761 and ln-625 via the Task tool. Finally, it merges findings, computes a risk score, and creates or updates SECURITY.md, pre-commit config, and CI workflow.
When to Use It
- During project bootstrap (invoked by ln-700-project-bootstrap)
- When a manual security audit is requested
- When initializing or updating CI/CD pipelines with security checks
- When onboarding a new repository requiring a baseline security setup
- After major dependency upgrades or suspected secrets exposure
Quick Start
- Step 1: Invoke ln-760-security-setup during project bootstrap to plan security checks
- Step 2: Let ln-761 and ln-625 run in parallel and generate outputs (SECURITY.md, hooks, CI)
- Step 3: Review generated files and commit updates to the repository
Best Practices
- Run pre-flight checks to identify project type and existing security configs
- Preserve custom sections in existing SECURITY.md and avoid overwriting user edits
- Keep .gitignore and secret patterns up to date with standard entries
- Delegate secrets scanning with ln-761 and vulnerabilities audit with mode=vulnerabilities_only
- Review outputs and tailor templates before commit to repo
Example Use Cases
- Bootstrapping a Node.js project with secret and dependency scanning
- Python project: update SECURITY.md using the provided template while preserving custom notes
- Go project: add CI workflow for security checks and gitleaks config
- .NET project: initiate security scans and generate pre-commit hooks
- Monorepo onboarding: aggregate findings across multiple packages and create a unified SECURITY.md