security-auditor

Expert security auditor specializing in DevSecOps, comprehensive cybersecurity, and compliance frameworks. Masters vulnerability assessment, threat modeling, secure authentication (OAuth2/OIDC), OWASP standards, cloud security, and security automation. Handles DevSecOps integration, compliance (GDPR/HIPAA/SOC2), and incident response. Use PROACTIVELY for security audits, DevSecOps, or compliance implementation.

Author

Install

Hot:1

Download and extract to your skills directory

Copy command and send to OpenClaw for auto-install:

Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-security-auditor&locale=en&source=copy

Security Auditor - DevSecOps Security Audit Expert

Skills Overview


Security Auditor is a comprehensive security audit specialist focused on DevSecOps, application security, and network security compliance. It helps you integrate security testing into your development process, assess vulnerability risk, and meet compliance requirements.

Use Cases

1. Security Auditing and Risk Assessment


When you need a comprehensive security assessment of applications, infrastructure, or development processes, Security Auditor can provide professional services including vulnerability scanning, threat modeling, and risk analysis. This includes SAST/DAST code scanning, container image security checks, and configuration auditing.

2. DevSecOps Pipeline Integration


When you want to integrate security testing into CI/CD workflows, this skill helps you design an end-to-end DevSecOps pipeline. It covers automated security testing, Policy as Code, Supply Chain Security (SBOM), and continuous compliance monitoring.

3. Compliance Certification Preparation


When you need to meet compliance requirements such as GDPR, HIPAA, SOC 2, or ISO 27001, Security Auditor can evaluate your current security posture, identify compliance gaps, and provide actionable remediation recommendations along with documentation support.

Core Capabilities

1. Comprehensive Vulnerability Assessment and Threat Modeling


Security Auditor supports multiple security testing approaches, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), and dependency vulnerability scanning. It also provides professional threat modeling services using methodologies such as STRIDE and PASTA to identify potential attack surfaces and prioritize risk based on CVSS scoring.

2. Modern Authentication and Authorization Security


This skill is proficient in modern identity protocols such as OAuth 2.0, OpenID Connect, SAML, and WebAuthn, as well as secure JWT implementations, zero-trust architecture design, and multi-factor authentication (MFA) solutions. It can help you design secure API gateways, implement fine-grained access control (RBAC/ABAC), and prevent common authentication vulnerabilities.

3. Cloud-Native and Container Security


Security Auditor has deep expertise in security services across cloud platforms such as AWS, Azure, and GCP. It can provide cloud security posture management, Kubernetes security policies, container image scanning, and runtime security protections. It also supports microservice security architecture design, service mesh security configuration, and unified management of security policies across multiple clouds.

FAQs

What is the difference between Security Auditor and automated vulnerability scanning tools?


Automated scanning tools can only detect known vulnerability patterns, while Security Auditor combines automation with human security analysis to deliver deeper security assessments. The skill not only runs SAST/DAST scans, but also performs threat modeling, architecture review, compliance gap analysis, and provides priority recommendations and remediation plans aligned with business scenarios.

Do I need special authorization to use this skill?


Security Auditor follows responsible security testing principles. Before starting any security audit, it confirms the test scope, asset inventory, and authorization status. For production environments, written approval is required to perform any intrusive testing. The skill strictly protects sensitive data and avoids disclosing any confidential information or credentials in reports.

In what cases should this skill not be used?


This skill is not suitable when you need formal legal compliance certifications (e.g., requiring official audit reports), perform unauthorized security testing, or only need simple automated scan results. Additionally, if there is no clear security testing scope or authorization, you should obtain the relevant approvals before initiating the security audit.