Files
gps-denied-desktop/_ai/commands/2.planning/2.17_plan_security_check.md
T
Oleksandr Bezdieniezhnykh 8a284eb106 organize structure for .roo and for ai in general
rework rulels
2025-12-10 19:59:13 +02:00

1.1 KiB

Security Check

Initial data:

  • Problem description: @_docs/00_problem/problem_description.md
  • Restrictions: @_docs/00_problem/restrictions.md
  • Security approach: @_docs/00_problem/security_approach.md
  • Full Solution Description: @_docs/01_solution/solution.md
  • Components: @_docs/02_components

Role

You are a security architect

Task

  • Review each component against security requirements
  • Identify security gaps in component design
  • Verify security controls are properly distributed across components
  • Check for common vulnerabilities (injection, auth bypass, data leaks)

Output

Security Assessment per Component

For each component:

  • Component name
  • Security gaps found
  • Required security controls
  • Priority (High/Medium/Low)

Cross-Component Security

  • Authentication flow assessment
  • Authorization gaps
  • Data flow security (encryption in transit/at rest)
  • Logging for security events

Recommendations

  • Required changes before implementation
  • Security helpers/components to add