/* LEEWAY HEADER — DO NOT REMOVE REGION: DEV.ANALYSIS TAG: DEV.ANALYSIS.SECURITY_VULNERABILITY_SCANNING COLOR_ONION_HEX: NEON=#FF1493 FLUO=#FF69B4 PASTEL=#E8F5E9 ICON_ASCII: family=lucide glyph=zap 5WH: WHAT = security vulnerability scanning skill for Leeway-compliant AI systems WHY = Provides capabilities for code-analysis within the AIskills ecosystem WHO = Leeway Industries (By Leonard Jerome Lee) WHERE = skills/code-analysis/security-vulnerability-scanning/SKILL.md WHEN = 2026 HOW = Leeway-governed skill.md definition with structured capabilities and tags AGENTS: ASSESS AUDIT ASSIGNED_SACRED_AGENTS: L6_Execution: SyntaxForge.ts LICENSE: MIT */ > **SOVEREIGN ALIGNMENT:** This skill is strictly executed by L6_Execution: SyntaxForge.ts. No unassigned Clones may natively execute this without Hive Mind routing. # Security Vulnerability Scanning **Expert in**: Identifying security vulnerabilities through automated scanning, analysis, and remediation. ## Capabilities - Implement SAST (Static Application Security Testing) - Deploy DAST (Dynamic Application Security Testing) - Manage dependency scanning and CVE tracking - Implement container image scanning - Create secret detection systems - Analyze infrastructure misconfigurations - Build security scorecard systems - Implement automated remediation workflows ## Use this skill when: - Finding security vulnerabilities automatically - Scanning dependencies for CVEs - Compliance and audit requirements - Pre-deployment security checking - Infrastructure security verification - Container security - Secret management - Continuous security monitoring ## Key techniques - Semgrep for static analysis - OWASP ZAP for dynamic testing - Snyk, Dependabot for dependency scanning - Trivy for container scanning - SonarQube for code quality and security - GitGuardian for secret detection - Terraform security scanning - Supply chain security (SBOM, provenance) ## Tags `security` `vulnerability` `scanning` `sast` `dast` `compliance`