Skip to content

meow:cso

Chief Security Officer mode — infrastructure-first security audit with OWASP Top 10, STRIDE, supply chain, and LLM/AI security scanning.

What This Skill Does

meow:cso runs a comprehensive security audit that thinks like a CSO, not a linter. Instead of just pattern-matching code, it starts with architecture and infrastructure — secrets archaeology, dependency supply chain, CI/CD pipeline security, and LLM/AI attack vectors — then layers on OWASP Top 10 and STRIDE threat modeling. It has two modes: daily (high confidence, zero noise) and comprehensive (deep scan, more findings).

Core Capabilities

  • 14-phase audit — From architecture mapping through OWASP, STRIDE, and data flow analysis
  • Two modes — Daily (8/10 confidence gate, zero noise) and Comprehensive (2/10 bar, surfaces more)
  • Infrastructure-first — Secrets, dependencies, CI/CD, webhooks before code patterns
  • LLM/AI security — Scans for prompt injection vectors and skill supply chain risks
  • False positive filtering — Dedicated phase to eliminate noise before reporting
  • Trend tracking — Compares findings across audit runs to show improvement/regression

When to Use This

Use meow:cso when...

  • You need a thorough security assessment before a release
  • You're onboarding a new codebase and want to understand its security posture
  • You've had a security incident and need to audit broadly
  • You want to check for OWASP Top 10 or STRIDE threats

Usage

bash
# Full daily audit (default — high confidence, zero noise)
/meow:cso

# Comprehensive deep scan (lower confidence threshold, more findings)
/meow:cso comprehensive

# Specific scope
/meow:cso src/api/

Example Prompts

PromptModeFocus
/meow:csoDailyFull project, 8/10 confidence
/meow:cso comprehensiveComprehensiveFull project, 2/10 bar
security audit before releaseDailyAuto-activates CSO
check for OWASP vulnerabilitiesDailyOWASP-focused scan

Quick Workflow

Phase 0-1: Architecture + Attack Surface Mapping
Phase 2-3: Secrets Archaeology + Dependency Supply Chain
Phase 4-6: CI/CD + Infrastructure + Webhooks
Phase 7-8: LLM/AI Security + Skill Supply Chain
Phase 9-11: OWASP Top 10 + STRIDE + Data Flow
Phase 12: False Positive Filtering
Phase 13-14: Report Generation + Save

Each finding answers: What? Where? Why? Impact? How to fix?

Skill Details

Phase: 4
Used by: reviewer, security agents
Plan-First Gate: Scopes audit via plan in comprehensive mode. Skips in --daily mode.

Gotchas

  • False positives in vendored/test code: Security scan flags minified vendor bundles or test fixtures → Exclude vendor/ and test/fixtures/ from scan scope
  • Missing auth checks on internal endpoints: "Internal only" APIs often become external → Audit ALL endpoints regardless of intended audience

Released under the MIT License.