Skip to main content
EQ
Foundry
Back to Guides
workflow · Engineers

Security Scanning for PRs

How to use the Security Gate workflow to catch vulnerabilities before merge

Overview

The Security Gate workflow scans code changes for common vulnerability patterns before they reach main, focusing on attack vectors frequent in frontend and full-stack applications.

What It Scans

CategoryExamples
XSS vectorsdangerouslySetInnerHTML, unescaped user input in templates
Environment leaksSecrets in client bundles, .env files in version control
SSRFUnvalidated URLs in server-side fetch calls, open redirects
DependenciesKnown CVEs in installed packages, outdated security patches

Quick Start

Install

npx skills add mclaude95/eq-foundry -s eq-review-security

Run a standalone scan

/eq-review-security

This flags findings for your review but never auto-fixes. HIGH-severity findings always surface for human judgment.

Run as part of the full pipeline

In the Engineering Pipeline, security scanning runs automatically as one of three parallel review agents when you invoke /eq-review, alongside patterns and quality checks.

Data Flow Tracing

The security review traces data flow, not just patterns. When user input enters through a form handler, the scanner follows that value through processing functions to verify sanitization before it reaches a template or database query.

When to Run

  • Every PR that touches authentication, authorization, or data handling
  • Every PR that adds or modifies API endpoints
  • Every PR that changes environment variables or secrets configuration
  • Before merge as a mandatory gate for production-bound code

Integration with eq-review

When run via /eq-review, security findings go through a confidence x impact filter:

SeverityConfidence threshold
Critical50%: surface even uncertain findings
High70%
Medium80%
Low90%: only high-confidence minor issues

This prevents alert fatigue while ensuring every critical issue surfaces.