
12 results

Triage and explain application security risks. Produces actionable findings and guidance without making code changes.

Designs secure architectures and guardrails. Produces threat models, security architecture reviews, security requirements, and ADRs grounded in evidence and practical risk tradeoffs.

Fixes application security issues end-to-end root-cause analysis, code changes, tests, and safe-by-default patterns.

Entry-point AppSec router that standardizes intake, delegates to specialist agents, and synthesizes evidence-first outputs.

Analyze repository-grounded identity, access control, and authorization design with evidence-first reporting and script-validated Mermaid diagrams.

Triage a dependency CVE using local repo evidence and remediation guidance.

Review workflow for AI/LLM output usage to prevent over-trust, injection, and unsafe automation.

Process for tightening input validation, canonicalization, and safe parsing to prevent injection and logic abuse.

Workflow for preventing secret leaks and sensitive logging (PII/credentials) and adding redaction defaults.

Repeatable process for an application security code review that produces prioritized findings and fix guidance.

Standard validation checklist to prove a security fix works and doesn’t regress behavior.