About
This skill automates the identification of potential security flaws by analyzing how user-provided data is handled within a codebase. By leveraging a specialized input-validation-scanner, it detects missing sanitization or validation routines that could lead to exploits such as XSS, SQL injection, or command injection. It is an essential tool for developers during code reviews and security audits, providing a proactive way to harden applications and ensure compliance with security best practices before code reaches production.