- Auth: Login/Register con creacion de clinica - Dashboard: KPIs reales, graficas recharts - Pacientes: CRUD completo con busqueda - Agenda: FullCalendar, drag-and-drop, vista recepcion - Expediente: Notas SOAP, signos vitales, CIE-10 - Facturacion: Facturas con IVA, campos CFDI SAT - Inventario: Productos, stock, movimientos, alertas - Configuracion: Clinica, equipo, catalogo servicios - Supabase self-hosted: 18 tablas con RLS multi-tenant - Docker + Nginx para produccion Co-Authored-By: claude-flow <ruv@ruv.net>
81 lines
2.2 KiB
Markdown
81 lines
2.2 KiB
Markdown
---
|
|
name: sparc-security-review
|
|
description: 🛡️ Security Reviewer - You perform static and dynamic audits to ensure secure code practices. You flag secrets, poor mod...
|
|
---
|
|
|
|
# 🛡️ Security Reviewer
|
|
|
|
## Role Definition
|
|
You perform static and dynamic audits to ensure secure code practices. You flag secrets, poor modular boundaries, and oversized files.
|
|
|
|
## Custom Instructions
|
|
Scan for exposed secrets, env leaks, and monoliths. Recommend mitigations or refactors to reduce risk. Flag files > 500 lines or direct environment coupling. Use `new_task` to assign sub-audits. Finalize findings with `attempt_completion`.
|
|
|
|
## Available Tools
|
|
- **read**: File reading and viewing
|
|
- **edit**: File modification and creation
|
|
|
|
## Usage
|
|
|
|
### Option 1: Using MCP Tools (Preferred in Claude Code)
|
|
```javascript
|
|
mcp__claude-flow__sparc_mode {
|
|
mode: "security-review",
|
|
task_description: "audit API security",
|
|
options: {
|
|
namespace: "security-review",
|
|
non_interactive: false
|
|
}
|
|
}
|
|
```
|
|
|
|
### Option 2: Using NPX CLI (Fallback when MCP not available)
|
|
```bash
|
|
# Use when running from terminal or MCP tools unavailable
|
|
npx claude-flow sparc run security-review "audit API security"
|
|
|
|
# For alpha features
|
|
npx claude-flow@alpha sparc run security-review "audit API security"
|
|
|
|
# With namespace
|
|
npx claude-flow sparc run security-review "your task" --namespace security-review
|
|
|
|
# Non-interactive mode
|
|
npx claude-flow sparc run security-review "your task" --non-interactive
|
|
```
|
|
|
|
### Option 3: Local Installation
|
|
```bash
|
|
# If claude-flow is installed locally
|
|
./claude-flow sparc run security-review "audit API security"
|
|
```
|
|
|
|
## Memory Integration
|
|
|
|
### Using MCP Tools (Preferred)
|
|
```javascript
|
|
// Store mode-specific context
|
|
mcp__claude-flow__memory_usage {
|
|
action: "store",
|
|
key: "security-review_context",
|
|
value: "important decisions",
|
|
namespace: "security-review"
|
|
}
|
|
|
|
// Query previous work
|
|
mcp__claude-flow__memory_search {
|
|
pattern: "security-review",
|
|
namespace: "security-review",
|
|
limit: 5
|
|
}
|
|
```
|
|
|
|
### Using NPX CLI (Fallback)
|
|
```bash
|
|
# Store mode-specific context
|
|
npx claude-flow memory store "security-review_context" "important decisions" --namespace security-review
|
|
|
|
# Query previous work
|
|
npx claude-flow memory query "security-review" --limit 5
|
|
```
|