Claude Code Plugins

Community-maintained marketplace

Feedback

security-architecture-overview

@harperaa/secure-claude-skills
0
0

Understand the defense-in-depth security architecture of Secure Vibe Coding OS. Use this skill when you need to understand the overall security approach, the 5-layer security stack, OWASP scoring, or when to use other security skills. Triggers include "security architecture", "defense in depth", "security layers", "how does security work", "OWASP score", "security overview", "security principles".

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name security-architecture-overview
description Understand the defense-in-depth security architecture of Secure Vibe Coding OS. Use this skill when you need to understand the overall security approach, the 5-layer security stack, OWASP scoring, or when to use other security skills. Triggers include "security architecture", "defense in depth", "security layers", "how does security work", "OWASP score", "security overview", "security principles".

Security Architecture Overview

Project Security Profile

Project: Secure Vibe Coding OS Version: 1.0 Next.js Version: 15.5.4 Security Audit Status: 0 vulnerabilities OWASP Score: 90/100 (Top 10% of Next.js applications)

What This Project Is

Secure Vibe Coding OS is a production-ready SaaS starter template built with security as a first-class concern, not an afterthought. Unlike typical Next.js starters that provide basic authentication and hope you figure out the rest, this starter embeds enterprise-grade security controls from day one.

Why This Architecture Exists

According to Veracode's 2024 State of Software Security Report, AI-generated code picks insecure patterns 45% of the time. Standard SaaS starters compound this problem by providing minimal security guidance. Developers then prompt AI to build features on an insecure foundation, and each new feature becomes a potential vulnerability.

This architecture breaks that cycle by providing:

  • Defense-in-depth security (multiple layers)
  • Secure-by-default patterns (opt-in to relaxed security)
  • AI-friendly security utilities (easy to use correctly)
  • 90/100 OWASP score baseline (top 10% of applications)

Key Security Principles

1. Defense-in-Depth

Every request passes through multiple security layers. If one fails, others catch the attack.

2. Fail-Secure

When errors occur, the system denies access by default. Better to show an error than grant unauthorized access.

3. Least Privilege

Users and systems get minimum access needed. Authentication confirms identity; authorization limits what they can do.

4. Security is Implemented, Not Assumed

We don't assume users will "use it securely." Security is baked into every utility, middleware, and pattern.

The 5-Layer Security Stack

Every request passes through these layers before reaching business logic:

User Browser
     │
     ▼
┌─────────────────────────────────────────────┐
│ Layer 0: Middleware (Security Headers)     │
│ • X-Frame-Options: DENY                     │
│ • Content-Security-Policy                   │
│ • HSTS (production only)                    │
│ • X-Content-Type-Options: nosniff           │
└──────────────┬──────────────────────────────┘
               │
               ▼
┌─────────────────────────────────────────────┐
│ Layer 1: Rate Limiting                      │
│ • 5 requests per minute per IP              │
│ • Returns HTTP 429 when exceeded            │
│ • Prevents brute force & resource abuse     │
└──────────────┬──────────────────────────────┘
               │
               ▼
┌─────────────────────────────────────────────┐
│ Layer 2: CSRF Protection                    │
│ • HMAC-SHA256 cryptographic signing         │
│ • Single-use tokens                         │
│ • Returns HTTP 403 if invalid               │
└──────────────┬──────────────────────────────┘
               │
               ▼
┌─────────────────────────────────────────────┐
│ Layer 3: Input Validation                   │
│ • Zod schema validation                     │
│ • Automatic XSS sanitization                │
│ • Type-safe data transformation             │
│ • Returns HTTP 400 if invalid               │
└──────────────┬──────────────────────────────┘
               │
               ▼
┌─────────────────────────────────────────────┐
│ Layer 4: Business Logic                     │
│ • Your handler code runs here               │
│ • Receives validated, sanitized data        │
│ • Clerk authentication checked in middleware│
└──────────────┬──────────────────────────────┘
               │
               ▼
┌─────────────────────────────────────────────┐
│ Layer 5: Secure Error Handling              │
│ • Generic messages in production            │
│ • Detailed errors in development            │
│ • No information leakage                    │
└─────────────────────────────────────────────┘

What This Achieves: An attacker must bypass all 5 layers simultaneously to compromise the system—effectively impossible with current attack techniques.

When to Use Each Security Skill

For API Route Protection:

  • csrf-protection skill: When creating POST/PUT/DELETE endpoints that change state
  • rate-limiting skill: When protecting endpoints from abuse (forms, expensive operations)
  • input-validation skill: When accepting any user input (always!)

For Application Security:

  • security-headers skill: When configuring middleware or need to understand CSP/HSTS
  • error-handling skill: When implementing error responses in API routes
  • auth-security skill: When implementing authentication/authorization with Clerk

For Integrations:

  • payment-security skill: When implementing Stripe payments via Clerk Billing
  • dependency-security skill: When adding packages or running security audits

For Verification:

  • security-testing skill: When testing security features or pre-deployment checklist

Architecture Decision Rationale

Why Layered Security?

The Single Point of Failure Problem: Traditional web applications often rely on a single security measure. If that one control fails or is bypassed, the entire system is compromised.

Real-world Example: The 2020 SolarWinds attack exploited a single compromised build server. Once attackers bypassed that one control, they had access to thousands of organizations. A defense-in-depth approach would have caught the intrusion at multiple other layers.

Our Approach: Like a medieval castle with moat, walls, towers, and inner keep—attackers must breach every layer. Each layer catches different attack types:

  • Middleware: Stops requests before they reach application code
  • Rate Limiting: Stops automated attacks
  • CSRF: Stops cross-origin attacks
  • Validation: Stops injection attacks
  • Authentication/Authorization: Stops unauthorized access

Complete Security Stack Pattern

Here's what a fully secure API route looks like:

// app/api/contact/route.ts
import { NextRequest, NextResponse } from 'next/server';
import { withRateLimit } from '@/lib/withRateLimit';
import { withCsrf } from '@/lib/withCsrf';
import { validateRequest } from '@/lib/validateRequest';
import { contactFormSchema } from '@/lib/validation';
import { handleApiError } from '@/lib/errorHandler';

async function contactHandler(request: NextRequest) {
  try {
    const body = await request.json();

    // Layer 3: Input validation
    const validation = validateRequest(contactFormSchema, body);
    if (!validation.success) {
      return validation.response;
    }

    const { name, email, subject, message } = validation.data;

    // Safe to process - all security layers passed
    await sendEmail({ to: 'admin@example.com', from: email, subject, message });

    return NextResponse.json({ success: true });

  } catch (error) {
    // Layer 5: Secure error handling
    return handleApiError(error, 'contact-form');
  }
}

// Layers 1-2: Apply security middlewares
export const POST = withRateLimit(withCsrf(contactHandler));

export const config = {
  runtime: 'nodejs', // Required for crypto operations
};

Environment-Specific Security

Development (Relaxed)

  • ✅ Detailed error messages (full stack traces)
  • ✅ Verbose logging
  • ✅ HTTP allowed (localhost)
  • ✅ Development keys

Production (Maximum Protection)

  • ✅ Generic error messages ONLY
  • ✅ Minimal logging (no PII)
  • ✅ HTTPS enforced (HSTS)
  • ✅ Production keys

Automatic Detection: The code detects process.env.NODE_ENV === 'production' and adjusts security posture automatically.

Tech Stack Security Components

Authentication: Clerk

  • SOC 2 certified
  • Handles password hashing, sessions, MFA, OAuth
  • 73% fewer auth vulnerabilities vs custom implementations
  • Skill: auth-security

Payments: Clerk Billing + Stripe

  • Never touch card data
  • PCI-DSS compliant (via Stripe)
  • Webhook signature verification
  • Skill: payment-security

Database: Convex

  • Type-safe queries
  • User-scoped data via ctx.auth.userId
  • Additional validation in mutations

Framework: Next.js 15.5.4

  • Latest security patches
  • Middleware for global security controls
  • App Router for better security boundaries

Quick Reference: Security Checklist

When creating a new API route, ensure:

  • Applied withRateLimit() if route could be abused
  • Applied withCsrf() for POST/PUT/DELETE
  • Validated input with Zod schemas from lib/validation.ts
  • Used handleApiError() in catch block
  • Checked authentication with await auth() from Clerk
  • Checked authorization if accessing user-specific resources
  • Used proper HTTP status codes (200, 400, 401, 403, 404, 429, 500)
  • No sensitive data logged (passwords, tokens, PII)
  • Set runtime: 'nodejs' in config for crypto operations
  • Tested the endpoint before committing

Common Patterns - Copy & Paste Templates

Template 1: Simple Protected Endpoint (No CSRF)

import { NextRequest, NextResponse } from 'next/server';
import { withRateLimit } from '@/lib/withRateLimit';
import { handleApiError, handleUnauthorizedError } from '@/lib/errorHandler';
import { auth } from '@clerk/nextjs/server';

async function handler(request: NextRequest) {
  try {
    const { userId } = await auth();
    if (!userId) return handleUnauthorizedError();

    // Your logic here

    return NextResponse.json({ success: true });
  } catch (error) {
    return handleApiError(error, 'route-name');
  }
}

export const GET = withRateLimit(handler);
export const config = { runtime: 'nodejs' };

Template 2: Form Submission with Full Protection

import { NextRequest, NextResponse } from 'next/server';
import { withRateLimit } from '@/lib/withRateLimit';
import { withCsrf } from '@/lib/withCsrf';
import { validateRequest } from '@/lib/validateRequest';
import { handleApiError, handleUnauthorizedError } from '@/lib/errorHandler';
import { contactFormSchema } from '@/lib/validation';
import { auth } from '@clerk/nextjs/server';

async function handler(request: NextRequest) {
  try {
    const { userId } = await auth();
    if (!userId) return handleUnauthorizedError();

    const body = await request.json();
    const validation = validateRequest(contactFormSchema, body);

    if (!validation.success) {
      return validation.response;
    }

    const { name, email, subject, message } = validation.data;

    // Process form (send email, save to DB, etc.)

    return NextResponse.json({ success: true });
  } catch (error) {
    return handleApiError(error, 'contact-form');
  }
}

export const POST = withRateLimit(withCsrf(handler));
export const config = { runtime: 'nodejs' };

Template 3: Public Endpoint (No Auth, Yes Rate Limit)

import { NextRequest, NextResponse } from 'next/server';
import { withRateLimit } from '@/lib/withRateLimit';
import { validateRequest } from '@/lib/validateRequest';
import { handleApiError } from '@/lib/errorHandler';
import { emailSchema } from '@/lib/validation';

async function handler(request: NextRequest) {
  try {
    const body = await request.json();
    const validation = validateRequest(emailSchema, body);

    if (!validation.success) {
      return validation.response;
    }

    const email = validation.data;

    // Process (e.g., newsletter signup)

    return NextResponse.json({ success: true });
  } catch (error) {
    return handleApiError(error, 'newsletter');
  }
}

export const POST = withRateLimit(handler);
export const config = { runtime: 'nodejs' };

What NOT to Do - Common Anti-Patterns

❌ Anti-Pattern 1: No Security Middlewares

// BAD - No protection
export async function POST(request: NextRequest) {
  const body = await request.json();
  // directly use body.field
  return NextResponse.json({ success: true });
}

Why this is bad: No rate limiting, no CSRF protection, no input validation. Vulnerable to brute force, CSRF attacks, and injection attacks.

❌ Anti-Pattern 2: Skipping Input Validation

// BAD - No validation
async function handler(request: NextRequest) {
  const body = await request.json();
  const { title } = body; // Could contain <script> tags!
  await saveToDatabase(title);
}

Why this is bad: XSS vulnerability. User input directly stored/displayed without sanitization.

❌ Anti-Pattern 3: Exposing Error Details in Production

// BAD - Information leakage
catch (error) {
  return NextResponse.json({
    error: error.message,      // Could reveal internal paths
    stack: error.stack,        // Exposes code structure
    query: failedQuery         // Reveals database schema
  }, { status: 500 });
}

Why this is bad: Helps attackers understand your system internals, database structure, file paths.

❌ Anti-Pattern 4: Hardcoding Secrets

// BAD - Hardcoded secret
const apiKey = 'sk_live_123456789';

// GOOD - Environment variable
const apiKey = process.env.API_KEY;

Why this is bad: Secrets end up in version control, easily exposed if repository is compromised.

❌ Anti-Pattern 5: No Rate Limiting on Public Forms

// BAD - Can be spammed infinitely
export async function POST(request: NextRequest) {
  await sendEmail(data);
  return NextResponse.json({ success: true });
}

// GOOD - Rate limited
export const POST = withRateLimit(async (request: NextRequest) => {
  await sendEmail(data);
  return NextResponse.json({ success: true });
});

Why this is bad: Attackers can spam your endpoints, rack up costs, or perform brute force attacks.

Security Awareness: Understanding AI Code Vulnerabilities

Before implementing security controls, understand why AI generates insecure code and what vulnerabilities to watch for:

Why AI Code Is Often Insecure

Statistics from Research:

  • 45% of AI-generated code has insecure patterns (Veracode 2024)
  • 36-72% contains vulnerabilities depending on language (Georgetown CSET 2024)
  • 68% of database queries have SQL injection (Aikido Security 2025)
  • 81% stores passwords insecurely (Databricks 2025)

Security Awareness Skills

Learn about specific vulnerability categories in AI-generated code:

Understanding Injection Attacks:security-awareness/injection-vulnerabilities - SQL injection, command injection, XSS

  • Real examples: Equifax (147M records), British Airways (£20M fine)
  • Why AI generates string concatenation instead of parameterized queries
  • Attack vectors and exploitation patterns

Understanding Authentication Defects:security-awareness/auth-vulnerabilities - Insecure passwords, broken sessions, access control

  • Real examples: Ashley Madison (32M accounts), Dropbox (68M accounts)
  • Why AI suggests MD5/plaintext passwords
  • Why AI forgets authorization checks

Understanding Information Leakage:security-awareness/information-leakage - Hardcoded secrets, verbose logging

  • Real examples: AWS keys exposed ($40K in 12 hours), payment data in logs
  • Why AI hardcodes credentials (training data)
  • What should never be logged

Understanding Supply Chain Risks:security-awareness/supply-chain-risks - Vulnerable dependencies, typosquatting

  • Real examples: event-stream hijacked (2M downloads/week), 245K malicious packages (2023)
  • Why AI suggests outdated packages (67% have vulnerabilities)
  • Dependency confusion attacks

Understanding Business Logic Flaws:security-awareness/business-logic-flaws - Race conditions, integer overflow

  • Real examples: Flash sales overselling, $250K refund exploit
  • Why logic flaws pass functional tests
  • Concurrent access vulnerabilities

Understanding Resource Exhaustion:security-awareness/resource-exhaustion - Unbounded operations, cost explosion

  • Real examples: $200K in AI API charges (4 hours unnoticed)
  • Why AI doesn't add resource limits
  • DoS attack patterns

Overall Security Awareness:security-awareness/awareness-overview - Complete overview of AI security risks

  • Statistics, research, real-world breaches
  • Path forward for secure vibe coding
  • Security-first prompting techniques

Next Steps

Based on your task, invoke the appropriate skill:

Implementation Skills (How to Build Securely)

  • Need to protect an API route? → csrf-protection skill
  • Need to prevent spam/abuse? → rate-limiting skill
  • Need to validate user input? → input-validation skill
  • Need to configure headers? → security-headers skill
  • Need error handling? → error-handling skill
  • Need authentication? → auth-security skill
  • Need payments? → payment-security skill
  • Need to update packages? → dependency-security skill
  • Need to test security? → security-testing skill

Operations Skills (Deployment & Monitoring)

  • When to use which middleware? → security-operations skill
  • Need environment variable setup? → security-operations skill
  • Pre-deployment checklist? → security-operations skill
  • Security monitoring setup? → security-operations skill
  • Maintenance schedule? → security-operations skill

Awareness Skills (Understanding Risks)

  • Want to understand AI security risks? → security-awareness/awareness-overview skill
  • Learning about injection attacks? → security-awareness/injection-vulnerabilities skill
  • Understanding auth vulnerabilities? → security-awareness/auth-vulnerabilities skill
  • Learning about exposed secrets? → security-awareness/information-leakage skill
  • Understanding supply chain? → security-awareness/supply-chain-risks skill
  • Learning about logic flaws? → security-awareness/business-logic-flaws skill
  • Understanding DoS risks? → security-awareness/resource-exhaustion skill

References