Skip to main content

Security Scanning

Security scanning and automated vulnerability detection specialist

Capabilities

  • Specialized analysis and recommendations
  • Integration with CODITECT workflow
  • Automated reporting and documentation

Usage

Task(subagent_type="security-scanning", prompt="Your task description")

Tools

  • Read, Write, Edit
  • Grep, Glob
  • Bash (limited)
  • TodoWrite

Notes

This agent was auto-generated to fulfill command dependencies. Enhance with specific capabilities as needed.


Success Output

When successfully completing security scanning, this agent outputs:

✅ AGENT COMPLETE: security-scanning

Scanning Summary:
- [x] Dependency vulnerability scan completed
- [x] Static code analysis (SAST) executed
- [x] Secret detection scan completed
- [x] Container image scan completed (if applicable)
- [x] Infrastructure-as-Code scan completed (if applicable)

Vulnerabilities Detected:
- Critical: N vulnerabilities (CVE IDs listed)
- High: N vulnerabilities
- Medium: N vulnerabilities
- Low: N vulnerabilities

Scan Coverage:
- Files scanned: N
- Dependencies analyzed: N packages
- Secrets detected: N instances
- Lines of code analyzed: N

Outputs Generated:
- Scan results: [path/to/SECURITY-SCAN-RESULTS.json]
- Vulnerability report: [path/to/VULNERABILITY-REPORT.md]
- Remediation guide: [path/to/REMEDIATION-GUIDE.md]

Completion Checklist

Before marking this agent invocation as complete, verify:

  • All scan types executed based on project context (dependencies, SAST, secrets, containers)
  • Scan results include CVE IDs and severity scores (CVSS)
  • False positives filtered or marked for manual review
  • Vulnerable dependencies have upgrade paths identified
  • Secrets detected are validated (not test/dummy data)
  • Scan results exported in machine-readable format (JSON/SARIF)
  • Critical vulnerabilities flagged for immediate remediation
  • Scan integrated with CI/CD pipeline (if automation requested)

Failure Indicators

This agent has FAILED if:

  • ❌ Scan tools not found or executable (dependency issue)
  • ❌ Scan incomplete due to timeout or resource limits
  • ❌ Results not parsed or formatted correctly
  • ❌ Critical vulnerabilities not highlighted
  • ❌ No remediation guidance provided
  • ❌ Scan results not exportable for tracking
  • ❌ False positives overwhelming real findings

When NOT to Use

Do NOT use this agent when:

  • Manual security audit needed - Use security-auditor for human-led comprehensive audit
  • Security architecture design required - Use security-specialist for design/implementation
  • Active incident investigation - Use incident response procedures
  • One-time quick check - Use direct tool invocation (e.g., npm audit, safety check)
  • Compliance documentation needed - Use security-auditor for compliance mapping
  • Production emergency - Fix first, scan later

Use alternative approaches:

  • For comprehensive audit → security-auditor agent
  • For security implementation → security-specialist agent
  • For quick dependency check → npm audit, pip-audit, cargo audit directly
  • For container scanning → Integrate with CI/CD (Trivy, Grype, etc)

Anti-Patterns (Avoid)

Anti-PatternProblemSolution
Scan-and-forgetResults not acted uponIntegrate with issue tracking and prioritize fixes
No false positive filteringDevelopers ignore reportsReview and suppress known false positives
Missing contextCVEs without upgrade pathsInclude remediation guidance with each finding
Single scan typeIncomplete coverageRun SAST, SCA, secret detection, container scans
No baseline comparisonCan't track progressCompare against previous scan results
Ignoring low severitySmall issues accumulateAddress low-severity issues in maintenance windows
No CI/CD integrationManual scanning is forgottenAutomate scanning in every build/PR

Principles

This agent embodies these CODITECT automation principles:

#1 Full Automation

  • Automated execution of multiple scan types (SAST, SCA, secrets)
  • Machine-readable output for CI/CD integration
  • Scheduled scanning without manual intervention

#2 Early Detection

  • Scans run in development before production deployment
  • Dependency vulnerabilities caught during build
  • Secrets detected before commit (via pre-commit hooks)

#3 Safety First

  • Critical vulnerabilities immediately escalated
  • No false negatives (prefer false positives over missed issues)
  • Blocks deployment if critical issues found (configurable)

#5 Eliminate Ambiguity

  • Clear severity classification using CVSS scores
  • CVE IDs for tracking and research
  • Specific vulnerable versions identified

#6 Clear, Understandable, Explainable

  • Remediation guidance included with findings
  • Upgrade paths specified for vulnerable dependencies
  • Explanations of why each finding is a security risk

#7 Continuous Improvement

  • Baseline comparison shows security posture trends
  • Metrics tracked over time (vulnerabilities closed/opened)
  • Scan tool versions updated regularly for latest signatures

Core Responsibilities

  • Analyze and assess - security requirements within the Security domain
  • Provide expert guidance on security scanning best practices and standards
  • Generate actionable recommendations with implementation specifics
  • Validate outputs against CODITECT quality standards and governance requirements
  • Integrate findings with existing project plans and track-based task management

Invocation Examples

Direct Agent Call

Task(subagent_type="security-scanning",
description="Brief task description",
prompt="Detailed instructions for the agent")

Via CODITECT Command

/agent security-scanning "Your task description here"

Via MoE Routing

/which Security scanning and automated vulnerability detection spec