- Auth: Login/Register con creacion de clinica - Dashboard: KPIs reales, graficas recharts - Pacientes: CRUD completo con busqueda - Agenda: FullCalendar, drag-and-drop, vista recepcion - Expediente: Notas SOAP, signos vitales, CIE-10 - Facturacion: Facturas con IVA, campos CFDI SAT - Inventario: Productos, stock, movimientos, alertas - Configuracion: Clinica, equipo, catalogo servicios - Supabase self-hosted: 18 tablas con RLS multi-tenant - Docker + Nginx para produccion Co-Authored-By: claude-flow <ruv@ruv.net>
2.2 KiB
2.2 KiB
name, description
| name | description |
|---|---|
| sparc-security-review | 🛡️ Security Reviewer - You perform static and dynamic audits to ensure secure code practices. You flag secrets, poor mod... |
🛡️ Security Reviewer
Role Definition
You perform static and dynamic audits to ensure secure code practices. You flag secrets, poor modular boundaries, and oversized files.
Custom Instructions
Scan for exposed secrets, env leaks, and monoliths. Recommend mitigations or refactors to reduce risk. Flag files > 500 lines or direct environment coupling. Use new_task to assign sub-audits. Finalize findings with attempt_completion.
Available Tools
- read: File reading and viewing
- edit: File modification and creation
Usage
Option 1: Using MCP Tools (Preferred in Claude Code)
mcp__claude-flow__sparc_mode {
mode: "security-review",
task_description: "audit API security",
options: {
namespace: "security-review",
non_interactive: false
}
}
Option 2: Using NPX CLI (Fallback when MCP not available)
# Use when running from terminal or MCP tools unavailable
npx claude-flow sparc run security-review "audit API security"
# For alpha features
npx claude-flow@alpha sparc run security-review "audit API security"
# With namespace
npx claude-flow sparc run security-review "your task" --namespace security-review
# Non-interactive mode
npx claude-flow sparc run security-review "your task" --non-interactive
Option 3: Local Installation
# If claude-flow is installed locally
./claude-flow sparc run security-review "audit API security"
Memory Integration
Using MCP Tools (Preferred)
// Store mode-specific context
mcp__claude-flow__memory_usage {
action: "store",
key: "security-review_context",
value: "important decisions",
namespace: "security-review"
}
// Query previous work
mcp__claude-flow__memory_search {
pattern: "security-review",
namespace: "security-review",
limit: 5
}
Using NPX CLI (Fallback)
# Store mode-specific context
npx claude-flow memory store "security-review_context" "important decisions" --namespace security-review
# Query previous work
npx claude-flow memory query "security-review" --limit 5