// SEC
T063
v1.0
Security Configuration Audit
Review a defined configuration or deployment setup for common security gaps and hardening priorities.
ABOUT
About this task
A scoped security review focused on configuration risks, misconfigurations, and a prioritized hardening checklist.
SPEC
Input / output spec
INPUT_REQUIRED
- Config files or screenshots
- Deployment context
- Known concerns
- Review boundaries
OUTPUT_DELIVERED
- Risk summary
- Issue list
- Hardening checklist
- Follow-up recommendations
PROCESS
Execution flow
01 → Share the relevant assets, links, transcripts, exports, or samples.
02 → Receive a scope-specific quote and ETA in under 5 minutes.
03 → We analyze the workflow, draft the deliverable, and rank the highest-leverage next moves.
04 → A human reviewer tightens the output and removes noise.
05 → Get a ready-to-use report or workflow spec your team can act on next.
TARGET
Who it is for
For founders, engineering leads, and operators who want a pragmatic first-pass security review.
DESCRIPTION
Suggested task description
The public API only needs a plain-language description. Copy this, then replace the team context, export link, and output language as needed.
Copy this description into the task description field
Audit our configuration or deployment setup for common security issues using the files, screenshots, URLs, or examples we provide. Focus on configuration risk, exposed settings, access controls, and hardening opportunities. Return the findings in English with priorities, concise explanations, and recommended next checks.