Files
claude-plugins-official/plugins/code-modernization/commands/modernize-harden.md
Morgan Westlee Lunt bdca23e8e4 Add code-modernization plugin
Structured workflow (assess → map → extract-rules → reimagine → transform →
harden) and specialist agents (legacy-analyst, business-rules-extractor,
architecture-critic, security-auditor, test-engineer) for modernizing legacy
codebases into current stacks.
2026-04-24 19:52:02 +00:00

1.5 KiB

description, argument-hint
description argument-hint
Security vulnerability scan + remediation — OWASP, CVE, secrets, injection <system-dir>

Run a security hardening pass on legacy/$1: find vulnerabilities, rank them, and fix the critical ones.

Scan

Spawn the security-auditor subagent:

"Adversarially audit legacy/$1 for security vulnerabilities. Cover: OWASP Top 10 (injection, broken auth, XSS, SSRF, etc.), hardcoded secrets, vulnerable dependency versions (check package manifests against known CVEs), missing input validation, insecure deserialization, path traversal. For each finding return: CWE ID, severity (Critical/High/Med/Low), file:line, one-sentence exploit scenario, and recommended fix. Also run any available SAST tooling (npm audit, pip-audit, OWASP dependency-check) and include its raw output."

Triage

Write analysis/$1/SECURITY_FINDINGS.md:

  • Summary scorecard (count by severity, top CWE categories)
  • Findings table sorted by severity
  • Dependency CVE table (package, installed version, CVE, fixed version)

Remediate

For each Critical and High finding, fix it directly in the source. Make minimal, targeted changes. After each fix, add a one-line entry under "Remediation Log" in SECURITY_FINDINGS.md: finding ID → commit-style summary of what changed.

Show the cumulative diff:

git -C legacy/$1 diff

Verify

Re-run the security-auditor against the patched code to confirm the Critical/High findings are resolved. Update the scorecard with before/after.

Suggest: glow -p analysis/$1/SECURITY_FINDINGS.md