Review implementation for security vulnerabilities and best practices. Checks input validation, injection prevention, auth/authz, secrets handling. Use after code review before merge.
Before starting, read trace files for the modules containing files under security review. Treat trace data as advisory -- verify critical assumptions (file existence, export availability) against source before irreversible decisions.
How to resolve relevant traces:
git diff --name-only or the spec's Implementation Evidence.claude/traces/trace.config.json and match each file path against module fileGlobs to find the owning module ID.claude/traces/low-level/<module-id>.jsonmtime against the staleness threshold (use isTraceStale(moduleId, config) from .claude/scripts/lib/trace-utils.mjs if available). Stale traces are still useful but verify critical assumptions against source.claude/traces/ directory, trace.config.json, or matching modules exist, skip this section entirely and proceed without traces -- no error or warning neededToken budget: Keep total trace reads under 5K tokens in dispatch context.
Before beginning work, address these operational feasibility questions:
If any question cannot be answered from available context, surface it as a finding -- do not skip.
Review implementation for security vulnerabilities before approval. Produce pass/fail report with findings and recommendations.
Key Input: Spec group at .claude/specs/groups/<spec-group-id>/
/security <spec-group-id> # Security review all changes for spec group
/security <spec-group-id> <atomic-spec-id> # Review sp...