mirror of
https://github.com/catlog22/Claude-Code-Workflow.git
synced 2026-02-11 02:33:51 +08:00
主要变更: - 模板重命名:采用优先级前缀(01-通用, 02-专用, 03-领域特定) - 目录调整:bug-diagnosis从development移至analysis - 引用更新:5个命令文件中21处模板引用更新为新路径 - 路径统一:所有引用统一使用完整路径格式 模板变更详情: - analysis/:8个模板(01-trace-code-execution, 01-diagnose-bug-root-cause等) - development/:5个模板(02-implement-feature, 02-refactor-codebase等) - planning/:5个模板(01-plan-architecture-design, 02-breakdown-task-steps等) - memory/:1个模板(02-document-module-structure) 命令文件更新: - cli/mode/bug-diagnosis.md(6处引用) - cli/mode/code-analysis.md(6处引用) - cli/mode/plan.md(6处引用) - task/execute.md(1处引用) - workflow/tools/test-task-generate.md(2处引用) 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
30 lines
1.2 KiB
Plaintext
30 lines
1.2 KiB
Plaintext
Analyze security implementation and potential vulnerabilities.
|
|
|
|
## CORE CHECKLIST ⚡
|
|
□ Identify all data entry points and external system interfaces
|
|
□ Provide file:line references for all potential vulnerabilities
|
|
□ Classify risks by severity and type (e.g., OWASP Top 10)
|
|
□ Apply RULES template requirements exactly as specified
|
|
|
|
## REQUIRED ANALYSIS
|
|
1. Identify authentication and authorization mechanisms
|
|
2. Assess input validation and sanitization practices
|
|
3. Review data encryption and secure storage methods
|
|
4. Evaluate API security and access control patterns
|
|
5. Document security risks and compliance considerations
|
|
|
|
## OUTPUT REQUIREMENTS
|
|
- Security vulnerability findings with file:line references
|
|
- Authentication/authorization pattern documentation
|
|
- Input validation examples and identified gaps
|
|
- Encryption usage patterns and recommendations
|
|
- Prioritized remediation plan based on risk level
|
|
|
|
## VERIFICATION CHECKLIST ✓
|
|
□ All CONTEXT files analyzed for security vulnerabilities
|
|
□ Every finding is backed by a code reference (file:line)
|
|
□ Both authentication and data handling are covered
|
|
□ Recommendations include clear, actionable remediation steps
|
|
|
|
Focus: Identifying security gaps and providing actionable remediation steps.
|