741 skills sorted by stars.
Automated security scanning for Vigil Guard v2.0.0. Use for OWASP Top 10 checks, TruffleHog secret detection, npm/pip vulnerabilit...
Security best practices and patterns for Vigil Guard v2.0.0 development. Use when implementing authentication, handling secrets, v...
Audits ArgoCD Application manifests and raw K8s resources for anti-patterns, security issues, and best practice violations. Use wh...
Queries GPT-5.2 for high-reasoning code analysis, root-cause bug fixing, and complex coding questions. Provides P0-P3 prioritized...
Scan codebase for secrets, API keys, credentials, and PII. Detect hardcoded sensitive data. Use when auditing for secrets, checkin...
Use when generating comprehensive security audit reports, analyzing security scan results, calculating security posture, or creati...
Audits Terraform code for anti-patterns, security issues, and best practice violations. Use when asked to audit, review, or check...
"Expert API architect specializing in RESTful API design, GraphQL, gRPC, and API security. Deep expertise in OpenAPI 3.1, authenti...
Immutable audit logging patterns for compliance and security. Covers event design, storage strategies, retention policies, and aud...
Automated dependency management with security scanning, update orchestration, and compatibility validation
"Expert Harbor container registry administrator specializing in registry operations, vulnerability scanning with Trivy, artifact s...
Analyze Flutter and mobile applications for OWASP Mobile Top 10 (2024) security compliance. Use this skill when performing securit...
Real-time bidirectional communication with security focus on CSWSH prevention, authentication, and message validation
WordPress security audit and vulnerability analysis. Use when reviewing WordPress code for security issues, auditing themes/plugin...
Authentication and authorization patterns including OAuth2, JWT, RBAC/ABAC, session management, API keys, password hashing, and MF...
Scans project dependencies for known vulnerabilities, outdated packages, and license compliance issues. Trigger keywords: dependen...
> Triggers (ANY of these should invoke this skill):
Create, update, validate, and submit Homebrew Casks. Use when the user mentions Homebrew cask/cask, Homebrew/homebrew-cask, adding...
Implement security best practices across the application stack. Use when securing APIs, implementing authentication, preventing vu...
セキュリティ脆弱性を自動検出する。認証情報のハードコード、コマンドインジェクション、危険なシェル構文などをチェック。
Run comprehensive security vulnerability scans when reviewing code. Automatically uses basic mode (fast, high/medium severity only...
Configure service mesh solutions including Istio, Linkerd, and Consul for traffic management, security, and observability in micro...
Webhook implementation and consumption patterns. Use when implementing webhook endpoints, sending webhooks, handling retries, or e...
Validate account security and authentication protocols.
"Performs comprehensive security and code quality audits. Use when asked to 'audit the codebase', 'check for vulnerabilities', or...
Quick security audit checking for hardcoded secrets, SSRF vectors, injection points, dependency issues, and missing security heade...
Implement comprehensive AWS security controls and compliance
Enforce continuous security vigilance and threat monitoring.
Secure GraphQL APIs - authentication, authorization, rate limiting, and validation
Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.
OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing s...
Analyzes proposed projects before implementation, identifies issues and improvement opportunities across 8 dimensions (security, p...
Master Redis security - authentication, ACL, TLS encryption, network hardening, and production security best practices