home / skills / rshankras / claude-code-apple-skills / security

security skill

/skills/security

This skill provides security reviews and guidance for Apple platform apps, helping you implement safe storage, biometric auth, and network protections.

npx playbooks add skill rshankras/claude-code-apple-skills --skill security

Review the files below or copy the command above to add this skill to your agents.

Files (5)
SKILL.md
5.5 KB
---
name: security
description: Security review and guidance for iOS, macOS, and watchOS apps. Covers secure storage, biometric authentication, network security, and platform-specific patterns. Use when implementing security features or reviewing code for vulnerabilities.
allowed-tools: [Read, Glob, Grep]
---

# Security Review for Apple Platforms

Comprehensive security guidance for iOS, macOS, and watchOS applications. Reviews code for vulnerabilities and provides secure implementation patterns.

## When This Skill Activates

Use this skill when the user:
- Asks for "security review" or "security audit"
- Wants to implement "secure storage" or "Keychain"
- Needs "Face ID", "Touch ID", or "biometric authentication"
- Asks about "certificate pinning" or "network security"
- Mentions "Data Protection" or "encryption"
- Wants to store "sensitive data", "credentials", or "tokens"
- Asks about "Secure Enclave" or hardware security

## Review Process

### Phase 1: Project Discovery

Identify the app's security surface:

```bash
# Find security-related code
Grep: "SecItem|Keychain|kSecClass"
Grep: "LAContext|biometryType|evaluatePolicy"
Grep: "URLSession|ATS|NSAppTransportSecurity"
Grep: "CryptoKit|SecKey|CC_SHA"
```

Determine:
- Platform (iOS, macOS, watchOS, or multi-platform)
- Sensitive data types (credentials, health data, financial, PII)
- Authentication methods in use
- Network communication patterns

### Phase 2: Secure Storage Review

Load and apply: **secure-storage.md**

Key areas:
- Keychain usage patterns
- Data Protection classes
- Secure Enclave for keys
- Avoiding insecure storage (UserDefaults, files)

### Phase 3: Authentication Review

Load and apply: **biometric-auth.md**

Key areas:
- Face ID / Touch ID implementation
- Fallback mechanisms
- LAContext configuration
- Keychain integration with biometrics

### Phase 4: Network Security Review

Load and apply: **network-security.md**

Key areas:
- App Transport Security configuration
- Certificate pinning
- TLS best practices
- Secure API communication

### Phase 5: Platform-Specific Review

Load and apply: **platform-specifics.md**

Key areas:
- iOS: Data Protection, App Groups, Keychain sharing
- macOS: Sandbox, Hardened Runtime, Keychain access
- watchOS: Health data, Watch Connectivity security

## Output Format

Present findings in this structure:

```markdown
# Security Review: [App Name]

**Platform**: iOS / macOS / watchOS / Universal
**Review Date**: [Date]
**Risk Level**: Critical / High / Medium / Low

## Summary

| Category | Status | Issues |
|----------|--------|--------|
| Secure Storage | ✅/⚠️/❌ | X issues |
| Authentication | ✅/⚠️/❌ | X issues |
| Network Security | ✅/⚠️/❌ | X issues |
| Platform Security | ✅/⚠️/❌ | X issues |

---

## 🔴 Critical Vulnerabilities

Security issues that expose user data or enable attacks.

### [Issue Title]

**File**: `path/to/file.swift:123`
**Risk**: [What could happen if exploited]
**OWASP Category**: [If applicable]

**Vulnerable Code**:
```swift
// current insecure code
```

**Secure Implementation**:
```swift
// fixed secure code
```

---

## 🟠 High Priority Issues

Issues that weaken security posture.

[Same format as above]

---

## 🟡 Medium Priority Issues

Issues that should be addressed for defense in depth.

[Same format as above]

---

## 🟢 Recommendations

Security hardening suggestions.

[Same format as above]

---

## ✅ Security Strengths

What the app does well:
- [Strength 1]
- [Strength 2]

---

## Action Plan

1. **[Critical]** [First fix]
2. **[Critical]** [Second fix]
3. **[High]** [Third fix]
...
```

## Priority Classification

### 🔴 Critical
- Credentials stored in plain text or UserDefaults
- Disabled SSL/TLS validation
- Hardcoded secrets or API keys
- SQL injection or code injection vulnerabilities
- Missing authentication on sensitive operations

### 🟠 High
- Keychain without appropriate access controls
- Missing biometric authentication for sensitive data
- Weak cryptographic implementations
- Overly permissive entitlements
- Sensitive data in logs

### 🟡 Medium
- Missing certificate pinning
- Biometric fallback too permissive
- Data Protection class could be stronger
- Missing jailbreak/integrity detection

### 🟢 Low/Recommendations
- Additional hardening measures
- Defense in depth improvements
- Code organization for security clarity

## Quick Checks

### Insecure Storage Detection
```bash
Grep: "UserDefaults.*password|UserDefaults.*token|UserDefaults.*secret|UserDefaults.*apiKey"
Grep: "\.write\(.*credential|\.write\(.*password"
Grep: "let.*apiKey.*=.*\"|let.*secret.*=.*\""
```

### Insecure Network Detection
```bash
Grep: "http://(?!localhost|127\.0\.0\.1)"
Grep: "AllowsArbitraryLoads.*true"
Grep: "serverTrust|URLAuthenticationChallenge.*useCredential"
```

### Sensitive Data in Logs
```bash
Grep: "print\(.*password|print\(.*token|NSLog.*credential"
Grep: "Logger.*password|os_log.*secret"
```

## References

- **secure-storage.md** - Keychain, Data Protection, Secure Enclave
- **biometric-auth.md** - Face ID, Touch ID, LAContext
- **network-security.md** - ATS, certificate pinning, TLS
- **platform-specifics.md** - iOS vs macOS vs watchOS

## External Resources

- [Apple Security Documentation](https://developer.apple.com/documentation/security)
- [OWASP Mobile Security](https://owasp.org/www-project-mobile-security/)
- [Apple Keychain Services](https://developer.apple.com/documentation/security/keychain_services)
- [App Transport Security](https://developer.apple.com/documentation/bundleresources/information_property_list/nsapptransportsecurity)

Overview

This skill provides security review and practical guidance for iOS, macOS, and watchOS applications. It focuses on secure storage, biometric authentication, network security, and platform-specific hardening. Use it to audit implementations, find vulnerabilities, and get concrete remediation steps.

How this skill works

I inspect source patterns and configuration that affect the app security surface: Keychain and storage usage, LAContext/biometrics, URLSession and ATS settings, cryptography usage, and platform entitlements. I classify findings by priority (Critical/High/Medium/Low) and produce actionable fixes, sample secure code, and a prioritized remediation plan. I also check for insecure defaults like UserDefaults for secrets, disabled TLS validation, and hardcoded keys.

When to use it

  • Performing a security review or audit of an Apple-platform app
  • Implementing secure storage (Keychain, Data Protection, Secure Enclave)
  • Adding Face ID, Touch ID, or biometric-protected keys
  • Reviewing network security: ATS, certificate pinning, TLS configuration
  • Assessing platform-specific patterns (app groups, sandbox, hardened runtime)

Best practices

  • Never store secrets in UserDefaults or plain files; prefer Keychain with appropriate Data Protection classes
  • Use Secure Enclave for private keys and mark items requiring biometry with access controls
  • Configure LAContext properly and avoid overly permissive biometric fallbacks
  • Enforce App Transport Security and validate server certificates; implement pinning where appropriate
  • Avoid logging sensitive data and remove hardcoded keys from source control
  • Apply least-privilege entitlements and enable hardened runtime/sandbox on macOS when possible

Example use cases

  • Audit an app that stores tokens in UserDefaults to identify critical remediation steps
  • Review biometric integration to ensure secure Keychain access and correct LAContext usage
  • Validate network stack for disabled TLS, insecure ATS exceptions, or missing certificate checks
  • Assess platform entitlements and data protection settings before release
  • Produce a prioritized action plan with secure code snippets and configuration recommendations

FAQ

What are the most common critical findings?

Storing credentials in plain text (UserDefaults/files), disabled TLS validation, and hardcoded secrets are the most frequent critical issues.

Can I use biometrics to protect Keychain items?

Yes. Mark Keychain items with appropriate access control flags so items require biometry or device unlock; prefer Secure Enclave-backed keys when available.