741 skills sorted by stars.
Insecure Deserialization Checker - Auto-activating skill for Security Fundamentals.Triggers on: insecure deserialization checker,...
Generate new OAuth integration providers for Dafthunk with backend providers, type definitions, frontend configurations, and integ...
External API integrations with OAuth2, async HTTP, and proper error handling
Expert IoT security review covering network security, authentication, encryption, secure boot, and attack surface analysis. Use wh...
Use telnet to interact with IoT device shells for pentesting operations including device enumeration, vulnerability discovery, cre...
Use picocom to interact with IoT device UART consoles for pentesting operations including device enumeration, vulnerability discov...
Security management for Hostinger VPS srv759970 - Fail2ban, WordPress security audits (25+ checks, 0-100% scoring), infrastructure...
Level 2 patterns - vulns, lic, sbom, doctor (security, compliance, environment health)
Configure JWT Bearer authentication with Keycloak for affolterNET.Web.Api. Use when setting up token validation, Keycloak integrat...
Implement secure JWT (JSON Web Token) authentication in Node.js applications with access/refresh tokens and role-based access cont...
Generate JWT authentication configuration and utilities for API security. Triggers on "create jwt config", "generate jwt authentic...
Jwt Token Validator - Auto-activating skill for Security Fundamentals.Triggers on: jwt token validator, jwt token validatorPart of...
Generate authentic social media content in Ken's distinctive multilingual style - mixing Cantonese, English, and Traditional Chine...
Key Rotation Manager - Auto-activating skill for Security Advanced.Triggers on: key rotation manager, key rotation managerPart of...
Keycloak administration including realm management, client configuration, OAuth 2.0 setup, user management with custom attributes,...
Route configuration, route model binding, and authorization. Use when working with routes, route binding, URL patterns, or when us...
Comprehensive legacy codebase analysis skill for technical debt assessment, security vulnerability scanning, performance bottlenec...
LMS authentication system including SSO integration, useAuthReady hook patterns, four-layer security architecture, and permission...
Log Analysis Security - Auto-activating skill for Security Advanced.Triggers on: log analysis security, log analysis securityPart...
Helps an agent analyze application logs and identify security issues.
Provides system-independent mathematical functions. Use this skill when working with mathematical operations, random number genera...
Find, install, and configure Model Context Protocol (MCP) servers for OpenCode. Use when user asks about finding MCP servers, inst...
Multi-agent and MCP pipeline security with 5-layer defense architecture. Use when building MCP servers, multi-agent systems, or an...
Route protection and authorization patterns for Clerk middleware. Use when implementing route guards, protecting API routes, confi...
OWASP Top 10, SAST/DAST, dependency security, and secrets management.
Auth0 security specialist covering attack protection, multi-factor authentication, token security, sender constraining, and compli...
Reverses and exploits mobile applications. Use when working with Android APK files, iOS IPA files, mobile app reversing, Frida hoo...
Master MongoDB security, authentication, authorization, encryption, and backup. Learn role-based access control, TLS/SSL, encrypti...
Use when implementing service-to-service security, mTLS, or service mesh patterns. Covers mutual TLS, Istio, Linkerd, certificate...