Back to list
iurygdeoliveira

audit-security

by iurygdeoliveira

Repositorio destinado a fornecer um kit inicial para desenvolvimento de SaaS usando laravel e filament

29🍴 12📅 Jan 20, 2026

SKILL.md


name: audit-security description: Automated security checklist and audit for Laravel/Filament applications, focusing on XSS, CSP, and IDOR.

Security Audit Skill

Use this skill to inspect code for common vulnerability patterns in the context of this specific project stack.

When to use this skill

  • When the user asks to "check for vulnerabilities" or "audit security".
  • Before deploying critical features involving user input or file handling.
  • When reviewing Blade templates or Controllers.

Audit Checklist

1. Cross-Site Scripting (XSS) in Blade

Pattern to Search: !! (unescaped output)

  • Rule: {{ }} is safe. {!! !!} is dangerous.
  • Action: Use grep_search for {!!.
  • Validation: Ensure variables inside {!! !!} are explicitly sanitized (e.g., using HtmlString from a trusted source or Purifier).
  • Exception: Intentionally raw HTML from the CMS (must be sanitized on save).

2. Content Security Policy (CSP)

File: app/Http/Middleware/SecurityHeadersMiddleware.php

  • Check: Are we allowing unsafe-inline unnecessarily?
  • Check: Are external domains (S3, R2, Analytics) whitelisted?
  • Action: Verify if img-src, script-src includes necessary domains (e.g., *.r2.cloudflarestorage.com).

3. IDOR (Insecure Direct Object References)

Context: Controllers/Livewire Components accepting IDs.

  • Rule: Never trust an ID from the client without checking ownership/policy.
  • Check:
    • Does the route use Route Model Binding with scoping? (e.g., ->scopeBindings())
    • Does the controller method call $this->authorize('update', $model)?
    • In Filament: Do Resources use getEloquentQuery() with tenant scopes?

4. Mass Assignment

Context: Models.

  • Rule: avoid $guarded = [] unless strictly necessary and controlled.
  • Prefer: $fillable with explicit fields.

Execution Steps

  1. Search: Run grep_search patterns for potential issues.
  2. Analyze: Read the surrounding code of matches.
  3. Report: List findings classified by Severity (High/Medium/Low).
  4. Fix: Propose specific code changes to mitigate.

Score

Total Score

80/100

Based on repository quality metrics

SKILL.md

SKILL.mdファイルが含まれている

+20
LICENSE

ライセンスが設定されている

+10
説明文

100文字以上の説明がある

+10
人気

GitHub Stars 100以上

0/15
最近の活動

1ヶ月以内に更新

+10
フォーク

10回以上フォークされている

+5
Issue管理

オープンIssueが50未満

+5
言語

プログラミング言語が設定されている

+5
タグ

1つ以上のタグが設定されている

+5

Reviews

💬

Reviews coming soon