Source instructions onlyA profile for using Claude Code to run broad security checks without treating the output as gospel.
Install or setup path
Install gstack from the upstream repository, then enable the documented security-audit workflow and adapt its checks to your own trust boundaries and deployment surface.
No verified install command on this page
This profile is useful for evaluation and workflow context, but WhichAITools did not verify one direct install command for it. Use the linked source instructions instead of guessing.
Use this profile for
Teams that need a repeatable first-pass security workflow during code review, release prep, or repository onboarding.
Primary categorySecurity Review
Source count3
OpenClaw relevantNo
What it does
This profile frames the security-audit workflow around Claude Code: scanning for OWASP-style app risks, obvious secret exposure, insecure defaults, dependency red flags, and trust-boundary mistakes that deserve a deeper manual review.
Best for
Teams that need a repeatable first-pass security workflow during code review, release prep, or repository onboarding.
Source context
This profile is grounded in the public gstack cso skill, which explicitly frames security work around secrets, supply chain, OWASP, and threat modeling. Anthropic's best-practices guide adds first-party guidance around verification, permissions, and tool usage, which matters when turning a security checklist into an executable Claude Code workflow.
gstack cso skill • gstack GitHub repository • Best Practices for Claude Code