Acerca de
Conducts a multi-phase security analysis that traces data flows from untrusted sources to sensitive sinks, identifying vulnerabilities like OWASP Top 10 issues across multiple programming languages. It automatically maps the application's business context, identifies high-value assets, and enumerates the attack surface before generating detailed reports with CVSS scoring and actionable remediation code. This skill is ideal for developers and security engineers who need an automated yet interactive audit process that produces professional-grade artifacts and structured risk assessments.