SKILL.md
$2b
-
Rate Limiting & Abuse Prevention — Ensure auth endpoints, AI calls, and expensive operations have rate limits. Verify rate limit counters can't be tampered with. See references/rate-limiting.md.
-
Payment Security — Check for client-side price manipulation, webhook signature verification, and subscription status validation. See references/payments.md.
-
Mobile Security — Verify secure token storage, API key protection via backend proxy, and deep link validation. See references/mobile.md.
-
AI / LLM Integration — Check for exposed AI API keys, missing usage caps, prompt injection vectors, and unsafe output rendering. See references/ai-integration.md.
-
Deployment Configuration — Verify production settings, security headers, source map exposure, and environment separation. See references/deployment.md.
-
Data Access & Input Validation — Check for SQL injection, ORM misuse, and missing input validation. See references/data-access.md.
If doing a partial review or generating code in a specific area, load only the relevant reference files.
Core Instructions
- Report only genuine security issues. Do not nitpick style or non-security concerns.
- When multiple issues exist, prioritize by exploitability and real-world impact.
- If the codebase doesn't use a particular technology (e.g., no Supabase), skip that section entirely.
- When generating new code, consult the relevant reference files proactively to avoid introducing vulnerabilities in the first place.
- If you find a critical issue (exposed secrets, disabled RLS, auth bypass), flag it immediately at the top of your response — don't bury it in a long list.
Output Format
Organize findings by severity: Critical → High → Medium → Low.
For each issue:
- State the file and relevant line(s).
- Name the vulnerability.
- Explain what an attacker could do (concrete impact, not abstract risk).
- Show a before/after code fix.
Skip areas with no issues. End with a prioritized summary.
Example Output
#### Critical
**lib/supabase.ts:3 — Supabase service_role key exposed in client bundle**
The service_role key bypasses all Row-Level Security. Anyone can extract it from the browser bundle and read, modify, or delete every row in your database.
// Before
const supabase = createClient(url, process.env.NEXT_PUBLIC_SUPABASE_SERVICE_KEY!)
// After — use the anon key client-side; service_role belongs only in server-side code
const supabase = createClient(url, process.env.NEXT_PUBLIC_SUPABASE_ANON_KEY!)
#### High
**app/api/checkout/route.ts:15 — Price taken from client request body**
An attacker can set any price (including $0.01) by modifying the request. Prices must be looked up server-side.
// Before
const session = await stripe.checkout.sessions.create({
line_items: [{ price_data: { unit_amount: req.body.price } }]
})
// After — look up the price server-side
const product = await db.products.findUnique({ where: { id: req.body.productId } })
const session = await stripe.checkout.sessions.create({
line_items: [{ price: product.stripePriceId }]
})
Summary
- Service role key exposed (Critical): Anyone can bypass all database security. Rotate the key immediately and move it to server-side only.
- Client-controlled pricing (High): Attackers can purchase at any price. Use server-side price lookup.
When Generating Code
These rules also apply proactively. Before writing code that touches auth, payments, database access, API keys, or user data, consult the relevant reference file to avoid introducing the vulnerability in the first place. Prevention is better than detection.
References
references/secrets-and-env.md— API keys, tokens, environment variable configuration, and.gitignorerules.
references/database-security.md— Supabase RLS, Firebase Security Rules, and Convex auth patterns.
references/authentication.md— JWT verification, middleware, Server Actions, and session management.
references/rate-limiting.md— Rate limiting strategies and abuse prevention.
references/payments.md— Stripe security, webhook verification, and price validation.
references/mobile.md— React Native and Expo security: secure storage, API proxy, deep links.
references/ai-integration.md— LLM API key protection, usage caps, prompt injection, and output sanitization.
references/deployment.md— Production configuration, security headers, and environment separation.
references/data-access.md— SQL injection prevention, ORM safety, and input validation.