741 skills sorted by stars.
Master Redis security - authentication, ACL, TLS encryption, network hardening, and production security best practices
Create or refine a concise, normative security policy ("Blue Book") for sensitive applications. Use when users need a threat model...
Game server security including encryption, anti-cheat, and secure communication
Detect OWASP Top 10 vulnerabilities via static analysis. Calculate security score (0.00-1.00) for code quality. Auto-generate reme...
Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementin...
Security validation, vulnerability scanning, and compliance checking.
Secure Spring Boot applications - authentication, authorization, OAuth2, JWT, CORS/CSRF protection
RBAC/ABAC implementation patterns, least privilege access, row-level security, column masking, and access review workflows.
Review code through hostile perspectives to find bugs, security issues, and unintended consequences the author missed. Use when re...
Download a file using security copy. Requires authentication. Use for Agentuity cloud platform operations
Network protocol analyzer and packet capture tool for traffic analysis, security investigations, and forensic examination using Wi...
Analyzes network protocol implementations to identify parsing vulnerabilities, state machine issues, and protocol-level security p...
Detects session management vulnerabilities including session fixation, session hijacking, and insecure cookie handling. Use when a...
AndroidアプリのセキュリティレビューをOWASP Mobile Top 10 2024およびMASVS (Mobile Application Security Verification Standard) の観点で実施し、Markdownレポートを生成...
REST API design patterns, OpenAPI specifications, versioning strategies, authentication, error handling, and security best practic...
外部APIとの統合設計パターンに関する専門知識。RESTful API、GraphQL、WebSocket等の統合設計と実装指針を提供します。Anchors:• 『RESTful Web APIs』(Leonard Richardson)/ 適用: RESTf...
REST and GraphQL API design patterns, OpenAPI/Swagger specifications, versioning strategies, and authentication patterns. Use when...
A conceptual skill for securing FastAPI REST APIs with JWT authentication
Api Key Manager - Auto-activating skill for Security Fundamentals.Triggers on: api key manager, api key managerPart of the Securit...
Manage Glide app access, privacy, authentication, and publishing.Use when configuring who can access an app, setting up sign-in me...
Activate arifOS Full Autonomy Governance mode. Use when the user types /fag, asks to enter full autonomy governance, or wants the...
CVE research and security patch workflow for Ark. Provides CVE API integration, mitigation strategies, and security-focused PR tem...
Orchestrate multi-agent artifact generation with the Primary Author → Parallel Reviewers → Synthesizer → Archive pattern. Use when...
Security patterns for Astro lead generation websites on Cloudflare. Forms, headers, bot protection, GDPR. Use for any production l...
Security audits, vulnerability analysis, and security best practices enforcement
Full 9-phase workflow for complex features, epics, and security-critical changes (2-4 hours)
Looks up OWASP Top 10 attack methods, CWE references, and form-specific vulnerability patterns with a bounty hunter mindset. Retur...
Attack Surface Analyzer - Auto-activating skill for Security Advanced.Triggers on: attack surface analyzer, attack surface analyze...
Attack WiFi networks using WPA/WPA2 cracking, WPS exploitation, Evil Twin attacks, deauthentication, and wireless reconnaissance....