20,421 skills sorted by stars.
Reveal the secret code by reading the asset and running the script
Core orchestration skill for the Claude Organization. Manages async sub-agents, worktrees, daily logs, and context handoff. This s...
Orchestrate project work: detect intent, run ADD checkpoints, and coordinate project-brief, task-engine, delegation-advisor, and p...
Secrets Management security skill
Validates environment variables in CI, prevents secret leaks, enforces masking, and provides fail-fast validation with clear docum...
Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when h...
Publish gate secrets scanning. Use for: safe_to_publish, scan for secrets, redact in-place. Determines publish gate status. Scan f...
Apply branding guidelines to page sections after style cleanup. Implements 60-30-10 color rule, alternates section backgrounds, an...
Detect clinical note sections (HPI, ROS, Assessment, Plan) using regex patterns and LLM topic segmentation. Generates ToC with acc...
Generates Astro component skeleton with slots. Stateless, deterministic. No content.
Imported skill _sections from vercel
Skill from tolgaio/neo
Secure C Coding security skill
Incorporating security at every step of software development – writing code that defends against vulnerabilities and protects user...
Build secure container images with Wolfi runtime, non-root users, and multi-stage builds. Templates for Python/uv, Bun, Node.js/pn...
Security best practices for production applications including PII protection, input validation, SQL injection prevention, XSS miti...
A comprehensive security skill that integrates with Secure Flow to help AI coding agents write secure code, perform security revie...
Implements security headers and Content Security Policy with safe rollout strategy (report-only → enforce), testing, and compatibi...
A comprehensive security middleware system for Next.js 13+ App Router API routes that provides authentication, rate limiting, CSRF...
expo-secure-store patterns for sensitive data. Use when storing tokens and credentials.
Boilerplate code templates for Tizen KeyManager integration. Generates C/C#/.NET code for password-protected secure data storage.
Teach Data Access Layer pattern to prevent CVE-2025-29927 middleware authentication bypass. Use when implementing authentication,...
Teach server action authentication and security patterns in Next.js 16. Use when implementing server actions, form handlers, or mu...
دليل شامل لتأمين تطبيقات الويب وحمايتها من الثغرات الشائعة.
Security Advisor for vulnerability analysis and risk assessment. Reviews code and architecture for security issues. Use this skill...
AI API key leakage review patterns. Use when code integrates AI providers (OpenAI, OpenRouter, Anthropic, Google/Gemini/Vertex, AW...
Security architecture and threat modeling. OWASP Top 10 analysis, security pattern implementation, vulnerability assessment, and s...
Design security architectures with threat modeling and zero trust
Execute threat modeling, vulnerability scanning, and security control validation. Use when relevant to the task.
Security review checklist for code and infrastructure
Identify and fix security vulnerabilities in code and infrastructure
Example security audit skill demonstrating how to audit code for security vulnerabilities. Use when the user asks to perform secur...
- Keywords: security, vulnerability, audit, OWASP, injection, XSS, CSRF
มาตรฐาน security ขั้นต่ำที่ทุก service ต้องมี: authentication, authorization, input validation, secrets handling, และ security hea...
Security Benchmark Runner - Auto-activating skill for Security Advanced.Triggers on: security benchmark runner, security benchmark...
Bun runtime security audit patterns. Load when reviewing Bun apps (bun.lockb, bunfig.toml, or bun:* imports present). Covers Bun s...
Terraform のセキュリティをチェックする。「セキュリティチェック」「シークレット検出」「セキュリティ監査」「tf セキュリティ」「state のシークレット」「機密情報確認」「セキュリティスキャン」「脆弱性チェック」「ハードコード検出」などで起動。
Use this skill when implementing security measures or conducting security audits. Provides OWASP Top 10 mitigations, authenticatio...
Skill for ensuring security best practices and regulatory compliance. Use when implementing authentication, handling sensitive dat...
| Atributo | Valor |
Convex security audit patterns. Load when reviewing Convex apps (convex/ directory present). Covers query/mutation auth, row-level...
"RAN security coordination with threat detection, cognitive consciousness, and intelligent security management for comprehensive n...
Guide for conducting comprehensive web dependency security scans to identify outdated libraries, CVEs, and security misconfigurati...
Design security controls and threat mitigations. Use for features involving auth, data, or external exposure.
Django security audit patterns. Load when reviewing Django apps (settings.py or manage.py present). Covers SECRET_KEY, ALLOWED_HOS...
Docker/container security audit patterns. Load when Dockerfile or docker-compose.yml present. Covers secrets in layers, port expos...
Security and environment configuration standards for web applications, including environment variable management, secure coding pr...
Security best practices, OWASP compliance, authentication patterns, and vulnerability prevention