Deterministic workflow for AI security vulnerability scanning across code repos, dependency manifests, container images, infrastructure-as-code, CI/CD configs, and LLM applications. Use when asked to run AI/LLM security reviews, triage vulnerabilities, map findings to OWASP LLM Top 10, assign remediation SLAs, and produce evidence-ready audit artifacts.
This skill includes a SKILL.md with agent instructions.