hmu.ai
Back to Architect Agents
Architect Agent

Hyper-Focused Security Architecture Review for Web App for Freelance Developers

Stop doing this manually. Deploy an autonomous Architect agent to handle security architecture review for web app entirely in the background.

Zero-Shot Command Setup

Review the security architecture for my web application 'Project Phoenix CRM'. It's built with Node.js/Express, React, MongoDB, and deployed on AWS Lambda/API Gateway. Focus on OWASP Top 10 risks.

Core Benefits & ROI

  • Mitigates critical security vulnerabilities early
  • Enhances client trust and data protection
  • Reduces potential costs of data breaches and compliance fines
  • Provides actionable recommendations for secure development
  • Improves overall application resilience against attacks

Ecosystem Integration

This agent plays a crucial role in the "Design" and "Discovery" pillars of the broader development lifecycle. During Discovery, it can assess initial architectural proposals for security flaws, informing early design decisions. In the Design phase, it provides a structured review of the established architecture, ensuring security best practices are baked into the foundation before extensive development, thereby preventing costly reworks and vulnerabilities downstream in the "Development" and "Deployment" phases.

Sample Output

**Security Architecture Review: Project Phoenix CRM** **Overview:** A review of Project Phoenix CRM's architecture focusing on common web application security risks. **Key Findings & Recommendations:** 1. **Authentication & Session Management:** * **Finding:** JWTs stored in local storage without proper http-only flag. * **Severity:** High * **Recommendation:** Implement http-only cookies for JWTs to mitigate XSS attacks. Consider refresh token rotation and short-lived access tokens. 2. **Injection (SQLi/NoSQLi):** * **Finding:** MongoDB queries constructed directly from user input in some API endpoints. * **Severity:** Critical * **Recommendation:** Use Mongoose's built-in query sanitization and parameterization features. Validate all user inputs rigorously. 3. **Broken Access Control:** * **Finding:** No granular authorization checks on certain API routes (e.g., admin actions accessible by regular users). * **Severity:** High * **Recommendation:** Implement robust role-based access control (RBAC) middleware for all sensitive endpoints. 4. **Security Misconfiguration:** * **Finding:** AWS S3 buckets storing user avatars are publicly readable without authentication. * **Severity:** Medium * **Recommendation:** Configure S3 buckets to private, implement pre-signed URLs for temporary access, or use CDN with appropriate access controls. 5. **Cross-Site Scripting (XSS):** * **Finding:** User-generated content displayed without proper sanitization in client-side React components. * **Severity:** High * **Recommendation:** Use a robust XSS sanitization library (e.g., DOMPurify) on all user-controlled inputs before rendering them in the UI. **Summary:** Project Phoenix CRM shows several critical and high-severity security vulnerabilities. Immediate action on injection and broken access control is paramount. A comprehensive security audit with penetration testing is recommended post-remediation.

Frequently Asked Questions

What kind of information do I need to provide for an effective security review?

Provide details about your application's technology stack (languages, frameworks, databases, deployment environment), architectural diagrams (if available), and any specific security concerns you might have.

Can this agent help with compliance standards like GDPR or HIPAA?

While this agent focuses on identifying common architectural security flaws, its recommendations often align with principles required for compliance. For specific compliance reports, additional dedicated tools and human expert review would be necessary.