$ recombobulate _
home / tips / ask-claude-to-run-a-security-audit-on-your-codebase
103

Ask Claude to Run a Security Audit on Your Codebase

recombobulate @recombobulate · Mar 28, 2026 · Workflows
ask-claude-to-run-a-security-audit-on-your-codebase

Static analysis tools catch patterns. Claude catches intent. Ask it to audit your codebase for security issues and it reads the actual logic — following data from user input through to database queries, checking auth middleware coverage, and spotting trust boundary violations.

Audit src/ for security vulnerabilities. Check for SQL injection, XSS, 
CSRF, hardcoded secrets, missing authentication, and insecure defaults. 
Report each finding with the file, line number, and a suggested fix.

Claude reads the code paths end-to-end, not just individual files. It catches issues that pattern-matching tools miss — like an input that's validated in the controller but used unsanitised in a different service that receives it via a queue.

Focus the audit on specific threat categories:

# Input validation
Check all API endpoints for missing or insufficient input validation. 
Which fields accept user input without sanitisation?

# Authentication and authorisation
Find routes that are missing auth middleware or endpoints where 
authorisation checks can be bypassed.

# Secrets exposure
Search for hardcoded API keys, tokens, passwords, and connection strings 
anywhere in the codebase — including config files, comments, and test fixtures.

# Dependency vulnerabilities
Check package.json (or composer.json, requirements.txt) for packages 
with known security issues. Suggest the minimum version upgrade to fix each one.

For the highest-value results, point Claude at your most sensitive code first:

Focus on the payment processing code in src/billing/ and the 
authentication flow in src/auth/. These handle money and credentials — 
flag anything that doesn't follow defence-in-depth principles.

After the audit, ask Claude to fix the findings one by one — it already knows where the issues are and what the fix should be.

A security audit that reads your actual code paths is worth more than a thousand generic checklist items.

via Claude Code

~/recombobulate $ tip --comments --count=0

Log in to leave a comment.

~/recombobulate $ tip --related --limit=3
0
Run Claude Code in GitHub Actions to Automatically Review Every Pull Request

Set up Claude Code as an automated reviewer in your CI pipeline — on every pull request, it reads the diff, checks for bugs, security issues, missing tests, and convention violations, then posts its findings as a PR comment. Your human reviewers get a head start because the obvious issues are already flagged before they look.

recombobulate @recombobulate · 1 day ago
0
Ask Claude to Build a Deployment Checklist from Your Actual Infrastructure

Before deploying, tell Claude to read your project — migrations, environment variables, queue workers, scheduled tasks, caching, third-party integrations — and generate a deployment checklist that's specific to your app. Not a generic "did you run migrations?" list, but one that knows YOUR infrastructure and catches the things YOUR deploy can break.

recombobulate @recombobulate · 1 day ago
0
Ask Claude to Generate a README from Your Actual Codebase — Not a Template

Instead of writing a README from memory or copying a template, tell Claude to read your project and generate one that's actually accurate — real setup instructions from your config, real architecture from your directory structure, real API examples from your routes, and real prerequisites from your dependency files.

recombobulate @recombobulate · 1 day ago