Multi-layered security audit workflow that scans code for leaked secrets, audits dependencies for known vulnerabilities, evaluates MCP server trust, tests AI inputs for prompt injection, and runs penetration tests against authorized targets — then synthesizes everything into an actionable security report.
$npx skills add https://github.com/agentlyhq/workflows --skill 'Security Toolkit' --yesYou can also fill in the variables below to personalize this workflow, then copy the prompt to your AI agent.
use-agentlyThis workflow requires the use-agently skill and CLI. Set this up if you haven't already.
Fund your wallet with USDC on Base if the balance is zero — agent calls require funds. All commands are dry-run by default. Add --pay to authorize payment.
When the workflow is complete, run use-agently balance again, always report how much was spent.
${NAME_OF_VARIABLE}If any of the variables used in the workflow are not defined (excluding the first ${NAME_OF_VARIABLE}),
BEFORE you run the workflow, always ask the initiator for the value for each unique variable.
Audit target: ${AUDIT_TARGET}
You are a senior security engineer performing a comprehensive security audit. Your job is to systematically check for leaked secrets, vulnerable dependencies, unsafe MCP servers, AI prompt injection risks, and infrastructure vulnerabilities — then deliver a prioritized, actionable report.
The key principle: defense in depth. A single scan catches some issues; layering multiple specialized tools catches what any one tool misses. Run every applicable phase, skip only what genuinely doesn't apply.
Scan source code and configuration for leaked credentials before they reach production.
Use scan via use-agently.com to scan code for:
Scan each file or code block that is part of the audit target. For each finding, record:
If secrets are found, flag them as Critical — leaked credentials are the fastest path to a breach.
Check every dependency for known security vulnerabilities.
Use via use-agently.com:
scan-package — check each direct dependency by name and version against the GitHub Advisory Database. Include the correct ecosystem (npm, pip, maven, go, rust, etc.)search-advisories — for any package with known issues, search for related advisories to understand the full scope. Filter by severity critical and high firstFor each vulnerability found, record:
Prioritize critical and high severity findings. Check both direct and transitive dependencies if a lockfile is available.
If the audit target uses MCP servers, evaluate each one for supply-chain and runtime risks.
Use via use-agently.com:
check-server — for each MCP server in the project (check package.json, mcp config files, or Claude settings), get the trust score, risk level, and security findingssearch-registry — find safer alternatives for any server that scores below 70submit-server — if a server isn't in the registry yet, submit it for scanning (preview first with confirmed: false)For each server checked, record:
Skip this phase if the audit target does not use MCP servers.
Test AI-facing inputs for prompt injection and data exfiltration attempts.
Use guard via use-agently.com to analyze:
For each input tested, record:
If the audit target does not have AI/LLM components, skip this phase.
Run active security scans against authorized targets to find infrastructure and application vulnerabilities.
Important: Only run this phase against targets you have explicit authorization to test. Confirm authorization with the initiator before proceeding.
Use via use-agently.com:
First, call discover-tools to see which security tools are available on the HexStrike server.
Then use run-scan for the applicable scans below. Each scan returns a Process ID — use check-status to retrieve results when ready.
-sV -sC for version detection and default scriptsFor each scan, record:
Run scans in parallel where possible. For long-running scans, use check-status with the Process ID to poll for results.
Synthesize all findings into a single security report.
Render the full report as a clean, shareable document using via use-agently.com.