741 skills sorted by stars.
Implement full Better Auth registration/login with JWT tokens and protect routes when authentication is mentioned
Patterns and best practices for Better-T-Stack projects (TanStack Router, Hono, Drizzle, tRPC, Better Auth)
Post tweets, read threads, search X/Twitter from the terminal using bird CLI. Use when automating Twitter, posting from scripts, a...
Guidance for bypassing HTML/JavaScript sanitization filters in security testing contexts. This skill should be used when tasked wi...
Build secure API authentication systems with OAuth2, JWT, API keys, and session management.Use when implementing secure authentica...
Writes educational textbook chapters following pedagogical best practices.
Check compliance with OWASP Top 10 security risks and best practices. Use when performing comprehensive security audits. Trigger w...
Analyze session management implementations to identify security vulnerabilities in web applications.Use when you need to audit ses...
Ingested updated docs into memory:
Access official Claude Code documentation including comprehensive guides on hooks, MCP servers, agent skills, slash commands, sett...
Cloud Security Posture - Auto-activating skill for Security Advanced.Triggers on: cloud security posture, cloud security posturePa...
Perform comprehensive code audits on repositories or directories. Use when asked to audit code, review a codebase, analyze code qu...
Review code changes for correctness, security, performance, and maintainability. Use for PR reviews,code audits, pre-merge checks,...
"Use this when user requests code review, pull request analysis, or quality assessment. Provides systematic 6-category checklist:...
Use when reviewing code for quality, design issues, implementation problems, security vulnerabilities, or architectural concerns....
Use when creating animations that reassure users, reduce anxiety, or communicate protection and security.
최종 규정 준수 검증 및 개선안 제시
Generate authentic, compelling copy for portfolios. Covers tone calibration, taglines, bios, project descriptions, and avoiding as...
Content Security Policy Generator - Auto-activating skill for Security Fundamentals.Triggers on: content security policy generator...
Convex backend patterns with security, validation, and performance best practices
Cookie Security Analyzer - Auto-activating skill for Security Fundamentals.Triggers on: cookie security analyzer, cookie security...
This skill provides guidance for cracking 7z archive password hashes. It should be used when tasked with recovering passwords from...
Advanced password recovery and hash cracking tool supporting multiple algorithms and attack modes. Use when: (1) Performing author...
A skill to create auth service for new applications.
This skill should be used when the user requests to generate, create, or configure Content Security Policy (CSP) headers for Next....
Generate Content Security Policy (CSP) header configurations for web security. Triggers on "create csp header", "generate content...
Compliance and security auditing for Cursor usage. Triggers on "cursor compliance","cursor audit", "cursor security review", "curs...
Install Cursor IDE and configure authentication. Triggers on "install cursor","setup cursor", "cursor authentication", "cursor log...
Configure SSO and enterprise authentication in Cursor. Triggers on "cursor sso","cursor saml", "cursor oauth", "enterprise cursor...