741 skills sorted by stars.
Analyze code, infrastructure, and configurations by conducting comprehensive security audits. It leverages tools within the securi...
This skill enables AI assistant to conduct a security-focused code review using the security-agent plugin. it analyzes code for po...
Automate security vulnerability testing covering OWASP Top 10, SQL injection, XSS, CSRF, and authentication issues.Use when perfor...
Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discov...
Security patterns, CSP nonces, input validation, auth checks, Supabase SSR patterns. Use when implementing authentication, forms,...
Automatically audits AI assistant code plugins for security vulnerabilities, best practices, AI assistant.md compliance, and quali...
Validates PopKit security posture using concrete vulnerability patterns, automated secret scanning, and OWASP-aligned checklists
Use when creating animations that convey strength, authority, or bold confidence in brand and product.
File Linear tickets from PR review feedback and notify the PR author. Use when asked to file a ticket from PR comments, create a t...
Use this skill when developing Go applications with the Prefab server framework.This includes creating servers, adding gRPC/HTTP h...
Use when stakeholders pressure you to change technical priorities and you're tempted to compromise on security-first or call it sy...
Use to manage legal, security, and procurement workflows for complex deals.
Skill for managing model provider priorities with authentication (OAuth/Subscription/API), usage limits, and automatic fallback ac...
Create well-formed quality attribute scenarios with measurable response criteria
Security scanning templates and checklists for OWASP Top 10, authentication, authorization, data protection. Use when conducting s...
Ultimate RabbitMQ expertise skill for production-grade message broker architecture, implementation, and operations. Top 0.01% know...
Rate Limiter Config - Auto-activating skill for Security Fundamentals.Triggers on: rate limiter config, rate limiter configPart of...
Network reconnaissance and security auditing using Nmap for port scanning, service enumeration, and vulnerability detection. Use w...
Security fix patterns for authentication and authorization vulnerabilities (credentials, JWT, deserialization, access control). Pr...
Index of security remediation skills. Routes to specialized skills for injection, cryptography, authentication, and configuration...
Audit a repository's structure and propose a safe, approval-gated reorganization plan. Use when asked to review repo anatomy, prop...
Expert Security Analyst for deep research and exploitability analysis of security findings. Use when you have a specific finding f...
Extended firmware analysis for embedded/IoT images with deep extraction, emulation, and vulnerability assessment.
Manage incoming internet traffic and reverse proxy configuration on the home network gateway. Configure Caddy, OAuth2 authenticati...
보안 관점에서 코드를 검토합니다. OWASP Top 10, credential 노출, injection 공격 등을 체크합니다.
Use when reviewing authentication or authorization code. Provides comprehensive security guidance on JWT validation, token exchang...