[ AI Augmentation Protocol ]
Target: Local Development
Status: Operational
System Ready

Execute
Security.

Your AI just became a senior security engineer. One command. 29 battle-tested security checks built into every coding assistant you already use.

[ Installation Vector ]

npx @netxeo/security-skill

[ Technical Specs ]

Security Modules
0
CWE Covered
0
OWASP Lists
0×
ASVS Level
0

[ Installation Setup ]

Smart detection
npx @netxeo/security-skill

USER > npx @netxeo/security-skill
╔══════════════════════════════════════════════╗
║        🔐  SECURITY SKILL  Interactive Setup ║
╚══════════════════════════════════════════════╝

   Language   : TypeScript / Node.js
   Deployment : Vercel
   AI tools   : cursor, windsurf, gemini

Let's tailor security coverage to your project. (~60 seconds)
? What type of project is this? Web application / API
? What infrastructure does it run on? Serverless / edge
? What features does it include? User auth, Database
? Any compliance requirements? EU users / GDPR
? Additional security hardening? Supply chain security
📦 Installing tailored security-skill...
✅ Skill files installed → .skills/security/
✅ .gitignore updated (6 security entries added)
Configuring AI assistants...
✅ .cursor/rules/security.mdc ← Cursor
✅ GEMINI.md created ← Gemini
✅ .windsurfrules created ← Windsurf
_

[ Execution Log ]

What happens after
/security-audit

USER > /security-audit
🔍 Detecting stack... Next.js · Supabase · Vercel · Node 20
📋 Running 25 security checks across 29 modules...
======================================
🔒 SECURITY AUDIT — myproject
Stack: Next.js · Supabase · Vercel
======================================
SCORE  :  61 / 100  [ WARNING ]
======================================
[!] Secrets & Files                  12/20  ← FIX
[+] Auth & Sessions                  18/20
[!] Database (RLS)                    8/20  ← FIX
[-] HTTP Headers                     13/20
[+] Source Code                      18/20
======================================
🔴CRITICAL — Supabase service role key exposed in frontend
Any visitor gets full DB access · Execute: /security-fix supabase-key
🟡HIGH — RLS disabled on 3 tables (users, orders, messages)
Authenticated users can read all rows · Execute: /security-fix rls
_

[ Visual Evidence ]

Without Protocol
AI behavior before
With Protocol Active
AI behavior after
Execution Output
Bonus execution

[ Implementation Protocol ]

[01]

Smart interactive setup.

npx @netxeo/security-skill
A 1-minute prompt detects your exact stack (Web, Docker, AI) and installs targeted modules. Or use --yes to install all.
[02]

Your AI becomes the expert.

/security-scan
Auto-detects your stack — Next.js, Firebase, Docker — and runs targeted checks. No guessing, no false positives.
[03]

Review & fix. Your call.

/security-fix
See the exact diff before anything changes. Every fix is explained. Non-breaking. Approved by you.

[ Feature Matrix ]

[01]

Scans in 30 seconds

No build step. No cloud. Pure AI pattern recognition on your actual codebase.

[02]

You approve every fix

The AI proposes a diff. You decide. Nothing changes without your explicit approval.

[03]

Security score /100

Tracked in memory-security.md. You'll watch your score climb with every fix.

[04]

Any stack, anywhere

Next.js, Express, Django, Laravel, Spring Boot. Auto-detected from your project.

[05]

Context-rich findings

Each vulnerability includes the attack vector, real-world impact, and a tailored fix.

[06]

Persistent memory

Accepted risks, rotation schedules — your AI remembers across every session.

[ Engine Compatibility ]

ClaudeCLAUDE.md
GitHub Copilotcopilot-instructions.md
Cursor.cursorrules
Windsurf.windsurfrules
Cline.clinerules
OpenAI CodexAGENTS.md
Continue.dev.continue/config.yaml
Aider.aider.conf.yml
GeminiGEMINI.md