Get the FREE Ultimate OpenClaw Setup Guide →

tenant-security-review

npx machina-cli add skill tomkraaij/ai-skills-librarian/tenant-security-review --openclaw
Files (1)
SKILL.md
506 B

Tenant Security Review (Team Variant)

Adds incident-derived checks:

  • Cache key composition
  • Background job scoping
  • Audit log tenant attribution

Extra checks

  • Verify queue consumers enforce tenant scope.
  • Verify feature flags cannot cross tenant boundaries.

Source

git clone https://github.com/tomkraaij/ai-skills-librarian/blob/main/fixtures/manual-tests/team-security/skills/tenant-security-review/SKILL.mdView on GitHub

Overview

Team Security variant focused on edge cases and incident learnings to strengthen multi-tenant isolation. It introduces incident-derived checks for cache key composition, background job scoping, and audit log tenant attribution, plus extra verifications for tenant scope in queues and feature flags.

How This Skill Works

The skill augments security reviews with concrete, incident-driven checks. It validates that cache keys include tenant context, that background jobs are scoped to a tenant, and that audit logs attribute actions to the correct tenant. It also runs extra checks to ensure queue consumers enforce tenant scope and that feature flags cannot cross tenant boundaries.

When to Use It

  • After a security incident revealed tenant boundary issues
  • During multi-tenant audits and compliance reviews
  • When validating cache key composition for tenant isolation
  • When verifying background job scoping across tenants
  • When checking feature flag and queue behaviors for tenant boundaries

Quick Start

  1. Step 1: Review incident learnings to identify tenant-related edge cases
  2. Step 2: Validate tenant-related checks: cache key composition, background job scope, audit log attribution
  3. Step 3: Run extra checks and document results for queue scope and feature flag boundaries

Best Practices

  • Ensure all cache keys include tenant identifiers to prevent cross-tenant leakage
  • Scope background jobs to a single tenant and validate cross-tenant data access
  • Require audit logs to consistently attribute actions to the correct tenant
  • Regularly verify queue consumers enforce tenant scope in worker processes
  • Test that feature flags cannot cross tenant boundaries and are scoped per tenant

Example Use Cases

  • Incident-driven cache key misconfiguration enabling cross-tenant access
  • Background job scoping bug discovered during incident review and fixed
  • Audit log attribution corrected after tenant mix-up in logs
  • Queue consumer tenant-scope validation added to CI tests
  • Feature flag boundary check prevented cross-tenant rollout

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers