VS Code Copilot Toolkit

Use the custom agent, security skills, and prompt commands directly in GitHub Copilot Chat.

Table of contents

Overview

The Copilot Toolkit is a collection of files in the .github/ directory that teach GitHub Copilot how to perform security scanning. When the repo is open in VS Code, Copilot automatically discovers:

  • 1 Custom Agent — deep security analysis with pattern detection
  • 8 Security Skills — each wraps a specific security scanner tool
  • 12 Custom Prompts — pre-built commands for common scanning workflows

No installation required — just open the repo in VS Code with Copilot enabled.


Custom Agent

@sechek.security-scanner

The Malicious Code Scanner Agent performs deep security analysis with pattern detection and remediation guidance.

How to invoke: In Copilot Chat, type:

@sechek.security-scanner Analyze this workspace for security issues

What it detects:

  • Data exfiltration and credential theft
  • Reverse shells and backdoors
  • Persistence mechanisms (cron, registry)
  • Obfuscated payloads (base64, eval)
  • System destruction patterns

The agent can operate standalone (using only LLM pattern recognition) or tool-enhanced (using the security scanning skills listed below when they are available on the system).


Security Skills

Skills teach Copilot how to invoke specific security tools. Each skill is a markdown file in .github/skills/ that describes tool installation, usage, and output interpretation.

Skill Scanner Languages / Targets
bandit-security-scan Bandit Python — AST analysis for dangerous functions, SQL injection, deserialization
checkov-security-scan Checkov IaC — Terraform, CloudFormation, K8s manifests, Dockerfiles, Helm
dependency-check-security-scan OWASP Dependency-Check SCA — Java, .NET, JS, Python, Ruby, Go dependencies
eslint-security-scan ESLint + security plugins JavaScript / TypeScript — XSS, injection, ReDoS, prototype pollution
guarddog-security-scan GuardDog Supply chain — PyPI & npm malicious package detection
shellcheck-security-scan ShellCheck Shell scripts — command injection, unquoted variables
graudit-security-scan Graudit Multi-language — pattern matching across 15+ languages, secrets detection
trivy-security-scan Trivy Containers, IaC, CVEs, secrets, SBOM — filesystem and image scanning

Skills are optional enhancers. If a scanner tool isn’t installed on your system, the agent will simply skip that skill and use other available scanners.


Custom Prompts

Prompts are pre-built commands you type in Copilot Chat. They appear as /sechek.* commands.

Scanning Prompts

Command Description
/sechek.security-scan Full workspace scan with the security scanner agent
/sechek.security-scan-quick Fast scan for malicious patterns, exfiltration, reverse shells
/sechek.security-scan-python Python-focused scan using Bandit and GuardDog
/sechek.security-scan-iac Infrastructure as Code scan using Checkov
/sechek.security-scan-shell Shell script scan using ShellCheck and Graudit
/sechek.security-scan-supply-chain Scan dependencies for supply chain attacks
/sechek.security-scan-precommit Pre-commit check for secrets and vulnerabilities

Tool Management Prompts

Command Description
/sechek.tools-advisor Get recommendations on which tools to run based on your codebase
/sechek.tools-scan Execute security tools and save results to tools-audit.md

Remediation Prompts

Command Description
/sechek.plan-fix Generate a prioritized remediation plan from scan results

Development Prompts

Command Description
/create-security-skill Create a new security scanning skill from tool documentation

Full Security Audit

1. /sechek.tools-advisor              → See which tools are relevant
2. /sechek.tools-scan ./src           → Run all recommended tools
3. @sechek.security-scanner           → Deep LLM analysis of results
4. /sechek.plan-fix                   → Get prioritized remediation plan

Quick Pre-Commit Check

/sechek.security-scan-precommit

Language-Specific Scan

# Python project
/sechek.security-scan-python

# Shell scripts
/sechek.security-scan-shell

# Infrastructure as Code
/sechek.security-scan-iac

# Dependencies
/sechek.security-scan-supply-chain

Output Files

Scans generate Markdown reports saved in your workspace:

File Generated By Contents
.github/.audit/tools-audit.md /sechek.tools-scan Raw tool output from all scanners
.github/.audit/scan-results.md @sechek.security-scanner Analysis with findings & remediation
.github/.audit/remediation-tasks.md /sechek.plan-fix Prioritized fix plan with SLAs

Remediation Planning

After running scans, use /sechek.plan-fix to generate a detailed remediation plan:

The plan includes:

  • Prioritized tasks grouped by severity (Critical → High → Medium → Low)
  • SLA timelines (24 hours for Critical, 1 week for High, etc.)
  • Fix patterns with vulnerable vs. secure code examples
  • Parallel execution opportunities to speed up remediation
  • Verification commands to confirm fixes