Security analysis and vulnerability detection
Detailed documentation for each command including when to use it, what it's best for, and real-world examples.
Run security analysis
Performs comprehensive security analysis including OWASP Top 10 vulnerability checks, secret detection (API keys, passwords), dependency vulnerability scanning, and security best practices validation.
/siftcoder:secure [scope]scopeSpecific file/directory to scan (optional, defaults to entire codebase)Pre-deployment security checks, regular security audits, CI/CD pipelines
Applications handling sensitive data, production deployments, security compliance
/siftcoder:secure src/ # Checks: SQL injection, XSS, secrets, dependencies, auth flaws