home / skills / jeremylongshore / claude-code-plugins-plus-skills / scanning-api-security
/plugins/api-development/api-security-scanner/skills/scanning-api-security
This skill helps you scan API security vulnerabilities across endpoints, enforcing best practices and rapidly surfacing risks for robust protection.
npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill scanning-api-securityReview the files below or copy the command above to add this skill to your agents.
---
name: scanning-api-security
description: |
Detect API security vulnerabilities including injection, broken auth, and data exposure.
Use when scanning APIs for security vulnerabilities.
Trigger with phrases like "scan API security", "check for vulnerabilities", or "audit API security".
allowed-tools: Read, Write, Edit, Grep, Glob, Bash(api:security-*)
version: 1.0.0
author: Jeremy Longshore <[email protected]>
license: MIT
---
# Scanning Api Security
## Overview
This skill provides automated assistance for api security scanner tasks.
This skill provides automated assistance for the described functionality.
## Prerequisites
Before using this skill, ensure you have:
- API design specifications or requirements documented
- Development environment with necessary frameworks installed
- Database or backend services accessible for integration
- Authentication and authorization strategies defined
- Testing tools and environments configured
## Instructions
1. Use Read tool to examine existing API specifications from {baseDir}/api-specs/
2. Define resource models, endpoints, and HTTP methods
3. Document request/response schemas and data types
4. Identify authentication and authorization requirements
5. Plan error handling and validation strategies
1. Generate boilerplate code using Bash(api:security-*) with framework scaffolding
2. Implement endpoint handlers with business logic
3. Add input validation and schema enforcement
4. Integrate authentication and authorization middleware
5. Configure database connections and ORM models
1. Write integration tests covering all endpoints
See `{baseDir}/references/implementation.md` for detailed implementation guide.
## Output
- `{baseDir}/src/routes/` - Endpoint route definitions
- `{baseDir}/src/controllers/` - Business logic handlers
- `{baseDir}/src/models/` - Data models and schemas
- `{baseDir}/src/middleware/` - Authentication, validation, logging
- `{baseDir}/src/config/` - Configuration and environment variables
- OpenAPI 3.0 specification with complete endpoint definitions
## Error Handling
See `{baseDir}/references/errors.md` for comprehensive error handling.
## Examples
See `{baseDir}/references/examples.md` for detailed examples.
## Resources
- Express.js and Fastify for Node.js APIs
- Flask and FastAPI for Python APIs
- Spring Boot for Java APIs
- Gin and Echo for Go APIs
- OpenAPI Specification 3.0+ for API documentation
This skill automates scanning API surfaces to detect common security vulnerabilities, including injection flaws, broken authentication, and sensitive data exposure. It guides inspection of API specs, endpoint behavior, and authentication flows to produce prioritized findings and remediation suggestions. Use it to accelerate security reviews and produce OpenAPI-consistent reports.
The skill reads API specifications and runtime behaviors, then runs targeted checks against endpoints, input validation, authentication logic, and response schemas. It looks for injection vectors, weak or missing auth checks, insecure data leaks, misconfigured CORS/headers, and unsafe error handling. Results include evidence, severity, and actionable fixes mapped to the API endpoints and schemas.
What prerequisites are needed to run scans?
Provide current API specifications, test environments or endpoints, authentication credentials for testing, and CI access if integrating scans.
Can it scan GraphQL or gRPC APIs?
The skill supports inspecting schema-driven APIs; GraphQL can be scanned by analyzing schema and resolvers, and gRPC can be checked by translating protobufs into endpoint and message tests.
How are findings prioritized?
Findings are ranked by severity based on exploitability, impacted data sensitivity, and authentication gaps, with remediation steps and code examples when applicable.