{
  "schemaVersion": "1.0",
  "item": {
    "slug": "nodejs-security-audit",
    "name": "Node.js Security Audit",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/npfaerber/nodejs-security-audit",
    "canonicalUrl": "https://clawhub.ai/npfaerber/nodejs-security-audit",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/nodejs-security-audit",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=nodejs-security-audit",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/nodejs-security-audit"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/nodejs-security-audit",
    "agentPageUrl": "https://openagent3.xyz/skills/nodejs-security-audit/agent",
    "manifestUrl": "https://openagent3.xyz/skills/nodejs-security-audit/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/nodejs-security-audit/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Node.js Security Audit",
        "body": "Structured security audit for Node.js HTTP servers and web applications."
      },
      {
        "title": "Critical (Must Fix Before Deploy)",
        "body": "Hardcoded Secrets\n\nSearch for: API keys, passwords, tokens in source code\nPattern: grep -rn \"password\\|secret\\|token\\|apikey\\|api_key\" --include=\"*.js\" --include=\"*.ts\" | grep -v node_modules | grep -v \"process.env\\|\\.env\"\nFix: Move to env vars, fail if missing: if (!process.env.SECRET) process.exit(1);\n\nXSS in Dynamic Content\n\nSearch for: innerHTML, template literals injected into DOM, unsanitized user input in responses\nFix: Use textContent, or escape: str.replace(/[&<>\"']/g, c => ({'&':'&amp;','<':'&lt;','>':'&gt;','\"':'&quot;',\"'\":\"&#39;\"}[c]))\n\nSQL/NoSQL Injection\n\nSearch for: String concatenation in queries, eval(), Function() with user input\nFix: Parameterized queries, input validation"
      },
      {
        "title": "High (Should Fix)",
        "body": "CORS Misconfiguration\n\nSearch for: Access-Control-Allow-Origin: *\nFix: Allowlist specific origins: const origin = ALLOWED.has(req.headers.origin) ? req.headers.origin : ALLOWED.values().next().value\n\nAuth Bypass\n\nCheck: Every route that should require auth actually checks it\nCommon miss: Static file routes, agent/webhook endpoints, health checks that expose data\n\nPath Traversal\n\nCheck: path.normalize() + startsWith(allowedDir) on all file-serving routes\nExtra: Resolve symlinks with fs.realpathSync() and re-check"
      },
      {
        "title": "Medium (Recommended)",
        "body": "Security Headers\n\nconst HEADERS = {\n  'X-Frame-Options': 'SAMEORIGIN',\n  'X-Content-Type-Options': 'nosniff',\n  'Referrer-Policy': 'strict-origin-when-cross-origin',\n  'Permissions-Policy': 'camera=(), microphone=(), geolocation=()',\n};\n// Apply to all responses\n\nRate Limiting\n\nconst attempts = new Map(); // ip -> { count, resetAt }\nconst LIMIT = 5, WINDOW = 60000;\nfunction isLimited(ip) {\n  const now = Date.now(), e = attempts.get(ip);\n  if (!e || now > e.resetAt) { attempts.set(ip, {count:1, resetAt:now+WINDOW}); return false; }\n  return ++e.count > LIMIT;\n}\n\nInput Validation\n\nBody size limits: if (bodySize > 1048576) { req.destroy(); return; }\nJSON parse in try/catch\nType checking on expected fields"
      },
      {
        "title": "Low (Consider)",
        "body": "Dependency Audit: npm audit\nError Leakage: Don't send stack traces to clients in production\nCookie Security: HttpOnly; Secure; SameSite=Strict"
      },
      {
        "title": "Report Format",
        "body": "## Security Audit: [filename]\n\n### Critical\n1. **[Category]** Description — File:Line — Fix: ...\n\n### High\n...\n\n### Medium\n...\n\n### Low\n...\n\n### Summary\nX critical, X high, X medium, X low"
      }
    ],
    "body": "Node.js Security Audit\n\nStructured security audit for Node.js HTTP servers and web applications.\n\nAudit Checklist\nCritical (Must Fix Before Deploy)\n\nHardcoded Secrets\n\nSearch for: API keys, passwords, tokens in source code\nPattern: grep -rn \"password\\|secret\\|token\\|apikey\\|api_key\" --include=\"*.js\" --include=\"*.ts\" | grep -v node_modules | grep -v \"process.env\\|\\.env\"\nFix: Move to env vars, fail if missing: if (!process.env.SECRET) process.exit(1);\n\nXSS in Dynamic Content\n\nSearch for: innerHTML, template literals injected into DOM, unsanitized user input in responses\nFix: Use textContent, or escape: str.replace(/[&<>\"']/g, c => ({'&':'&amp;','<':'&lt;','>':'&gt;','\"':'&quot;',\"'\":\"&#39;\"}[c]))\n\nSQL/NoSQL Injection\n\nSearch for: String concatenation in queries, eval(), Function() with user input\nFix: Parameterized queries, input validation\nHigh (Should Fix)\n\nCORS Misconfiguration\n\nSearch for: Access-Control-Allow-Origin: *\nFix: Allowlist specific origins: const origin = ALLOWED.has(req.headers.origin) ? req.headers.origin : ALLOWED.values().next().value\n\nAuth Bypass\n\nCheck: Every route that should require auth actually checks it\nCommon miss: Static file routes, agent/webhook endpoints, health checks that expose data\n\nPath Traversal\n\nCheck: path.normalize() + startsWith(allowedDir) on all file-serving routes\nExtra: Resolve symlinks with fs.realpathSync() and re-check\nMedium (Recommended)\n\nSecurity Headers\n\nconst HEADERS = {\n  'X-Frame-Options': 'SAMEORIGIN',\n  'X-Content-Type-Options': 'nosniff',\n  'Referrer-Policy': 'strict-origin-when-cross-origin',\n  'Permissions-Policy': 'camera=(), microphone=(), geolocation=()',\n};\n// Apply to all responses\n\n\nRate Limiting\n\nconst attempts = new Map(); // ip -> { count, resetAt }\nconst LIMIT = 5, WINDOW = 60000;\nfunction isLimited(ip) {\n  const now = Date.now(), e = attempts.get(ip);\n  if (!e || now > e.resetAt) { attempts.set(ip, {count:1, resetAt:now+WINDOW}); return false; }\n  return ++e.count > LIMIT;\n}\n\n\nInput Validation\n\nBody size limits: if (bodySize > 1048576) { req.destroy(); return; }\nJSON parse in try/catch\nType checking on expected fields\nLow (Consider)\n\nDependency Audit: npm audit Error Leakage: Don't send stack traces to clients in production Cookie Security: HttpOnly; Secure; SameSite=Strict\n\nReport Format\n## Security Audit: [filename]\n\n### Critical\n1. **[Category]** Description — File:Line — Fix: ...\n\n### High\n...\n\n### Medium\n...\n\n### Low\n...\n\n### Summary\nX critical, X high, X medium, X low"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/npfaerber/nodejs-security-audit",
    "publisherUrl": "https://clawhub.ai/npfaerber/nodejs-security-audit",
    "owner": "npfaerber",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/nodejs-security-audit",
    "downloadUrl": "https://openagent3.xyz/downloads/nodejs-security-audit",
    "agentUrl": "https://openagent3.xyz/skills/nodejs-security-audit/agent",
    "manifestUrl": "https://openagent3.xyz/skills/nodejs-security-audit/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/nodejs-security-audit/agent.md"
  }
}