安全运营

Universal

senior-secops

by alirezarezvani

覆盖应用安全、漏洞管理与合规审计,支持代码/依赖扫描、CVE 评估、Secrets 检测和安全自动化,适合做安全基线落地、漏洞响应、审计检查与安全开发治理。

应用安全、漏洞管理和合规检查一套打通,还能自动化扫描与响应,帮团队更早发现并收敛风险。

11.5k安全与合规未扫描2026年3月5日

安装

claude skill add --url github.com/alirezarezvani/claude-skills/tree/main/engineering-team/senior-secops

文档

Senior SecOps Engineer

Complete toolkit for Security Operations including vulnerability management, compliance verification, secure coding practices, and security automation.


Table of Contents


Trigger Terms

Use this skill when you encounter:

CategoryTerms
Vulnerability ManagementCVE, CVSS, vulnerability scan, security patch, dependency audit, npm audit, pip-audit
OWASP Top 10injection, XSS, CSRF, broken authentication, security misconfiguration, sensitive data exposure
ComplianceSOC 2, PCI-DSS, HIPAA, GDPR, compliance audit, security controls, access control
Secure Codinginput validation, output encoding, parameterized queries, prepared statements, sanitization
Secrets ManagementAPI key, secrets vault, environment variables, HashiCorp Vault, AWS Secrets Manager
AuthenticationJWT, OAuth, MFA, 2FA, TOTP, password hashing, bcrypt, argon2, session management
Security TestingSAST, DAST, penetration test, security scan, Snyk, Semgrep, CodeQL, Trivy
Incident Responsesecurity incident, breach notification, incident response, forensics, containment
Network SecurityTLS, HTTPS, HSTS, CSP, CORS, security headers, firewall rules, WAF
Infrastructure Securitycontainer security, Kubernetes security, IAM, least privilege, zero trust
Cryptographyencryption at rest, encryption in transit, AES-256, RSA, key management, KMS
Monitoringsecurity monitoring, SIEM, audit logging, intrusion detection, anomaly detection

Core Capabilities

1. Security Scanner

Scan source code for security vulnerabilities including hardcoded secrets, SQL injection, XSS, command injection, and path traversal.

bash
# Scan project for security issues
python scripts/security_scanner.py /path/to/project

# Filter by severity
python scripts/security_scanner.py /path/to/project --severity high

# JSON output for CI/CD
python scripts/security_scanner.py /path/to/project --json --output report.json

Detects:

  • Hardcoded secrets (API keys, passwords, AWS credentials, GitHub tokens, private keys)
  • SQL injection patterns (string concatenation, f-strings, template literals)
  • XSS vulnerabilities (innerHTML assignment, unsafe DOM manipulation, React unsafe patterns)
  • Command injection (shell=True, exec, eval with user input)
  • Path traversal (file operations with user input)

2. Vulnerability Assessor

Scan dependencies for known CVEs across npm, Python, and Go ecosystems.

bash
# Assess project dependencies
python scripts/vulnerability_assessor.py /path/to/project

# Critical/high only
python scripts/vulnerability_assessor.py /path/to/project --severity high

# Export vulnerability report
python scripts/vulnerability_assessor.py /path/to/project --json --output vulns.json

Scans:

  • package.json and package-lock.json (npm)
  • requirements.txt and pyproject.toml (Python)
  • go.mod (Go)

Output:

  • CVE IDs with CVSS scores
  • Affected package versions
  • Fixed versions for remediation
  • Overall risk score (0-100)

3. Compliance Checker

Verify security compliance against SOC 2, PCI-DSS, HIPAA, and GDPR frameworks.

bash
# Check all frameworks
python scripts/compliance_checker.py /path/to/project

# Specific framework
python scripts/compliance_checker.py /path/to/project --framework soc2
python scripts/compliance_checker.py /path/to/project --framework pci-dss
python scripts/compliance_checker.py /path/to/project --framework hipaa
python scripts/compliance_checker.py /path/to/project --framework gdpr

# Export compliance report
python scripts/compliance_checker.py /path/to/project --json --output compliance.json

Verifies:

  • Access control implementation
  • Encryption at rest and in transit
  • Audit logging
  • Authentication strength (MFA, password hashing)
  • Security documentation
  • CI/CD security controls

Workflows

Workflow 1: Security Audit

Complete security assessment of a codebase.

bash
# Step 1: Scan for code vulnerabilities
python scripts/security_scanner.py . --severity medium

# Step 2: Check dependency vulnerabilities
python scripts/vulnerability_assessor.py . --severity high

# Step 3: Verify compliance controls
python scripts/compliance_checker.py . --framework all

# Step 4: Generate combined report
python scripts/security_scanner.py . --json --output security.json
python scripts/vulnerability_assessor.py . --json --output vulns.json
python scripts/compliance_checker.py . --json --output compliance.json

Workflow 2: CI/CD Security Gate

Integrate security checks into deployment pipeline.

yaml
# .github/workflows/security.yml
name: Security Scan

on:
  pull_request:
    branches: [main, develop]

jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Set up Python
        uses: actions/setup-python@v5
        with:
          python-version: '3.11'

      - name: Security Scanner
        run: python scripts/security_scanner.py . --severity high

      - name: Vulnerability Assessment
        run: python scripts/vulnerability_assessor.py . --severity critical

      - name: Compliance Check
        run: python scripts/compliance_checker.py . --framework soc2

Workflow 3: CVE Triage

Respond to a new CVE affecting your application.

code
1. ASSESS (0-2 hours)
   - Identify affected systems using vulnerability_assessor.py
   - Check if CVE is being actively exploited
   - Determine CVSS environmental score for your context

2. PRIORITIZE
   - Critical (CVSS 9.0+, internet-facing): 24 hours
   - High (CVSS 7.0-8.9): 7 days
   - Medium (CVSS 4.0-6.9): 30 days
   - Low (CVSS < 4.0): 90 days

3. REMEDIATE
   - Update affected dependency to fixed version
   - Run security_scanner.py to verify fix
   - Test for regressions
   - Deploy with enhanced monitoring

4. VERIFY
   - Re-run vulnerability_assessor.py
   - Confirm CVE no longer reported
   - Document remediation actions

Workflow 4: Incident Response

Security incident handling procedure.

code
PHASE 1: DETECT & IDENTIFY (0-15 min)
- Alert received and acknowledged
- Initial severity assessment (SEV-1 to SEV-4)
- Incident commander assigned
- Communication channel established

PHASE 2: CONTAIN (15-60 min)
- Affected systems identified
- Network isolation if needed
- Credentials rotated if compromised
- Preserve evidence (logs, memory dumps)

PHASE 3: ERADICATE (1-4 hours)
- Root cause identified
- Malware/backdoors removed
- Vulnerabilities patched (run security_scanner.py)
- Systems hardened

PHASE 4: RECOVER (4-24 hours)
- Systems restored from clean backup
- Services brought back online
- Enhanced monitoring enabled
- User access restored

PHASE 5: POST-INCIDENT (24-72 hours)
- Incident timeline documented
- Root cause analysis complete
- Lessons learned documented
- Preventive measures implemented
- Stakeholder report delivered

Tool Reference

security_scanner.py

OptionDescription
targetDirectory or file to scan
--severity, -sMinimum severity: critical, high, medium, low
--verbose, -vShow files as they're scanned
--jsonOutput results as JSON
--output, -oWrite results to file

Exit Codes:

  • 0: No critical/high findings
  • 1: High severity findings
  • 2: Critical severity findings

vulnerability_assessor.py

OptionDescription
targetDirectory containing dependency files
--severity, -sMinimum severity: critical, high, medium, low
--verbose, -vShow files as they're scanned
--jsonOutput results as JSON
--output, -oWrite results to file

Exit Codes:

  • 0: No critical/high vulnerabilities
  • 1: High severity vulnerabilities
  • 2: Critical severity vulnerabilities

compliance_checker.py

OptionDescription
targetDirectory to check
--framework, -fFramework: soc2, pci-dss, hipaa, gdpr, all
--verbose, -vShow checks as they run
--jsonOutput results as JSON
--output, -oWrite results to file

Exit Codes:

  • 0: Compliant (90%+ score)
  • 1: Non-compliant (50-69% score)
  • 2: Critical gaps (<50% score)

Security Standards

OWASP Top 10 Prevention

VulnerabilityPrevention
A01: Broken Access ControlImplement RBAC, deny by default, validate permissions server-side
A02: Cryptographic FailuresUse TLS 1.2+, AES-256 encryption, secure key management
A03: InjectionParameterized queries, input validation, escape output
A04: Insecure DesignThreat modeling, secure design patterns, defense in depth
A05: Security MisconfigurationHardening guides, remove defaults, disable unused features
A06: Vulnerable ComponentsDependency scanning, automated updates, SBOM
A07: Authentication FailuresMFA, rate limiting, secure password storage
A08: Data Integrity FailuresCode signing, integrity checks, secure CI/CD
A09: Security Logging FailuresComprehensive audit logs, SIEM integration, alerting
A10: SSRFURL validation, allowlist destinations, network segmentation

Secure Coding Checklist

markdown
## Input Validation
- [ ] Validate all input on server side
- [ ] Use allowlists over denylists
- [ ] Sanitize for specific context (HTML, SQL, shell)

## Output Encoding
- [ ] HTML encode for browser output
- [ ] URL encode for URLs
- [ ] JavaScript encode for script contexts

## Authentication
- [ ] Use bcrypt/argon2 for passwords
- [ ] Implement MFA for sensitive operations
- [ ] Enforce strong password policy

## Session Management
- [ ] Generate secure random session IDs
- [ ] Set HttpOnly, Secure, SameSite flags
- [ ] Implement session timeout (15 min idle)

## Error Handling
- [ ] Log errors with context (no secrets)
- [ ] Return generic messages to users
- [ ] Never expose stack traces in production

## Secrets Management
- [ ] Use environment variables or secrets manager
- [ ] Never commit secrets to version control
- [ ] Rotate credentials regularly

Compliance Frameworks

SOC 2 Type II Controls

ControlCategoryDescription
CC1Control EnvironmentSecurity policies, org structure
CC2CommunicationSecurity awareness, documentation
CC3Risk AssessmentVulnerability scanning, threat modeling
CC6Logical AccessAuthentication, authorization, MFA
CC7System OperationsMonitoring, logging, incident response
CC8Change ManagementCI/CD, code review, deployment controls

PCI-DSS v4.0 Requirements

RequirementDescription
Req 3Protect stored cardholder data (encryption at rest)
Req 4Encrypt transmission (TLS 1.2+)
Req 6Secure development (input validation, secure coding)
Req 8Strong authentication (MFA, password policy)
Req 10Audit logging (all access to cardholder data)
Req 11Security testing (SAST, DAST, penetration testing)

HIPAA Security Rule

SafeguardRequirement
164.312(a)(1)Unique user identification for PHI access
164.312(b)Audit trails for PHI access
164.312(c)(1)Data integrity controls
164.312(d)Person/entity authentication (MFA)
164.312(e)(1)Transmission encryption (TLS)

GDPR Requirements

ArticleRequirement
Art 25Privacy by design, data minimization
Art 32Security measures, encryption, pseudonymization
Art 33Breach notification (72 hours)
Art 17Right to erasure (data deletion)
Art 20Data portability (export capability)

Best Practices

Secrets Management

python
# BAD: Hardcoded secret
API_KEY = "sk-1234567890abcdef"

# GOOD: Environment variable
import os
API_KEY = os.environ.get("API_KEY")

# BETTER: Secrets manager
from your_vault_client import get_secret
API_KEY = get_secret("api/key")

SQL Injection Prevention

python
# BAD: String concatenation
query = f"SELECT * FROM users WHERE id = {user_id}"

# GOOD: Parameterized query
cursor.execute("SELECT * FROM users WHERE id = %s", (user_id,))

XSS Prevention

javascript
// BAD: Direct innerHTML assignment is vulnerable
// GOOD: Use textContent (auto-escaped)
element.textContent = userInput;

// GOOD: Use sanitization library for HTML
import DOMPurify from 'dompurify';
const safeHTML = DOMPurify.sanitize(userInput);

Authentication

javascript
// Password hashing
const bcrypt = require('bcrypt');
const SALT_ROUNDS = 12;

// Hash password
const hash = await bcrypt.hash(password, SALT_ROUNDS);

// Verify password
const match = await bcrypt.compare(password, hash);

Security Headers

javascript
// Express.js security headers
const helmet = require('helmet');
app.use(helmet());

// Or manually set headers:
app.use((req, res, next) => {
  res.setHeader('X-Content-Type-Options', 'nosniff');
  res.setHeader('X-Frame-Options', 'DENY');
  res.setHeader('X-XSS-Protection', '1; mode=block');
  res.setHeader('Strict-Transport-Security', 'max-age=31536000; includeSubDomains');
  res.setHeader('Content-Security-Policy', "default-src 'self'");
  next();
});

Reference Documentation

DocumentDescription
references/security_standards.mdOWASP Top 10, secure coding, authentication, API security
references/vulnerability_management_guide.mdCVE triage, CVSS scoring, remediation workflows
references/compliance_requirements.mdSOC 2, PCI-DSS, HIPAA, GDPR requirements

Tech Stack

Security Scanning:

  • Snyk (dependency scanning)
  • Semgrep (SAST)
  • CodeQL (code analysis)
  • Trivy (container scanning)
  • OWASP ZAP (DAST)

Secrets Management:

  • HashiCorp Vault
  • AWS Secrets Manager
  • Azure Key Vault
  • 1Password Secrets Automation

Authentication:

  • bcrypt, argon2 (password hashing)
  • jsonwebtoken (JWT)
  • passport.js (authentication middleware)
  • speakeasy (TOTP/MFA)

Logging & Monitoring:

  • Winston, Pino (Node.js logging)
  • Datadog, Splunk (SIEM)
  • PagerDuty (alerting)

Compliance:

  • Vanta (SOC 2 automation)
  • Drata (compliance management)
  • AWS Config (configuration compliance)

相关 Skills

依赖审计

by alirezarezvani

Universal
热门

面向多语言项目做依赖体检,扫描漏洞与 CVE、排查许可证冲突、梳理传递依赖和过时版本,给出安全升级与合规治理建议。

依赖审计能快速揪出项目依赖中的漏洞与合规风险,把安全扫描和审计合在一起,适合依赖链复杂的团队持续把关。

安全与合规
未扫描11.5k

安全审计

by alirezarezvani

Universal
热门

安装前审计 Claude Code Skill 的代码执行、Prompt 注入和依赖供应链风险,支持本地目录或 Git 仓库扫描,输出 PASS/WARN/FAIL 结论及修复建议

把代码审查、漏洞扫描和合规检查串成一条线,帮团队更早发现风险,做安全治理更省心。

安全与合规
未扫描11.5k

安全专家

by alirezarezvani

Universal
热门

覆盖威胁建模、漏洞评估、安全架构设计、代码审计与渗透测试,内置 STRIDE、OWASP、加密模式和安全扫描流程,适合系统设计评审与上线前安全排查。

安全专家把威胁建模、漏洞分析到渗透测试串成一套流程,内置 STRIDE 与 OWASP 指南,做安全设计和排查更省心。

安全与合规
未扫描11.5k

相关 MCP 服务

搜索和分析 Sentry 错误报告,辅助调试。

把零散的 Sentry 错误报告变成可检索线索,帮你在海量报错里更快定位线上故障,排障调试明显省时。

安全与合规
639

为 AI agents 提供安全层:拦截 prompt injection、识别伪造 packages,并扫描漏洞风险。

给 AI Agent 补上关键安全层,能拦截 prompt 注入、识别伪造包并扫描漏洞风险,把防护前置更省心。

安全与合规
95

强化安全性的 NotebookLM MCP,集成 post-quantum encryption,提升数据防护能力。

安全与合规
53

评论