--- name: security-clean description: Scan and remediate security findings — auto-fixes deterministic issues, confirms semi-auto with user, reports manual findings --- # Security Clean Scan, classify, and remediate security findings with user confirmation. ## Step 1: Parse Arguments - Target path = `$ARGUMENTS` or current working directory - `--dry-run` flag = report only, no changes ## Step 2: Create Backup ```bash node /scanners/lib/fs-utils.mjs backup "" ``` ## Step 3: Run Scan ```bash node /scanners/lib/fs-utils.mjs tmppath clean-findings.json node /scanners/scan-orchestrator.mjs "" --output-file "" ``` Show banner with verdict, risk score, finding counts. ## Step 4: Auto-fix Deterministic Issues ```bash node /scanners/auto-cleaner.mjs "" --findings "" [--dry-run] ``` Report: Applied, Skipped, Failed counts. ## Step 5: Semi-auto Remediation For findings classified as semi-auto (entropy strings, permission mismatches, typosquatted deps, ghost hooks, suspicious URLs, credential access, hidden MCP directives, homoglyphs): 1. Read the referenced files and understand the surrounding context 2. Propose specific, minimal changes grouped by fix type 3. Present each proposal to the user for confirmation before applying 4. Apply confirmed changes via Edit tool ## Step 6: LLM Threat Scan Read `/knowledge/skill-threat-patterns.md`. Scan modified files for remaining threats. Report manual findings that require human judgment. ## Step 7: Validate and Report Re-scan to verify fixes didn't introduce new issues. If validation fails, offer to restore from backup: ```bash node /scanners/lib/fs-utils.mjs restore "" ``` Final report: pre/post comparison, fix summaries, remaining manual findings, rollback instructions.