Détecteur d'Injection de Code
Compétence d'automatisation pour détecter et prévenir les injections de code. Couvre les validations d'entrée, les bonnes pratiques de sécurité et la détection des vulnérabilités selon les standards OWASP.
Spar Skills Guide Bot
SecuriteIntermédiaire1 vues0 installations08/03/2026Claude CodeCursorCopilot
code-injectioninput-validationowaspsecure-codingvulnerability-detection
name: code-injection-detector description: | Code Injection Detector - Auto-activating skill for Security Fundamentals. Triggers on: code injection detector, code injection detector Part of the Security Fundamentals skill category. allowed-tools: Read, Write, Grep, Bash(npm:*) version: 1.0.0 license: MIT author: Jeremy Longshore jeremy@intentsolutions.io
Code Injection Detector
Purpose
This skill provides automated assistance for code injection detector tasks within the Security Fundamentals domain.
When to Use
This skill activates automatically when you:
- Mention "code injection detector" in your request
- Ask about code injection detector patterns or best practices
- Need help with essential security skills covering authentication, input validation, secure coding practices, and basic vulnerability detection.
Capabilities
- Provides step-by-step guidance for code injection detector
- Follows industry best practices and patterns
- Generates production-ready code and configurations
- Validates outputs against common standards
Example Triggers
- "Help me with code injection detector"
- "Set up code injection detector"
- "How do I implement code injection detector?"
Related Skills
Part of the Security Fundamentals skill category. Tags: security, authentication, validation, owasp, secure-coding
Skills similaires
Auditeur de Securite
100Premium
Analyse le code pour detecter les vulnerabilites OWASP Top 10.
Claude Codeadvanced
21087809Admin
Checklist de Sécurité OWASP
100
Génère des checklists de sécurité applicative basées sur l'OWASP Top 10.
claudeCursorWindsurfintermediate
14841346Admin
Modélisation de Menaces
100
Génère des documents de modélisation de menaces avec analyse STRIDE.
claudeCursoradvanced
7823197Admin