check_security_compliance
Identify and analyze code for security vulnerabilities such as injection, XSS, and authentication flaws. Ensure compliance by detecting sensitive data exposure and weak cryptographic practices.
Instructions
Check code for security vulnerabilities and compliance
Input Schema
Name | Required | Description | Default |
---|---|---|---|
checkTypes | No | Types of security checks to perform | |
code | Yes | Code to check for security issues |