Not on Product Hunt
Claude Skills
AI Agentssoon
Workflowssoon
Creators

Not on Product Hunt

1,496 curated Claude Skills. We rejected 2,904 so you don't have to.

Categories

DevelopmentMarketingSecurityIntegrationsOperationsLegal

Resources

Submit a SkillSearch SkillsCreatorsSitemapllms.txt

Legal

Privacy PolicyTerms of Service

© 2025 Not on Product Hunt. Not affiliated with Product Hunt.

Built for the Claude community

Home/Best for security

Best Claude Skills for Security Professionals

These Claude Skills help security professionals identify vulnerabilities, conduct code security audits, build threat models, and navigate compliance requirements. Many are contributed by verified security researchers and organizations.

Best for developersBest for operationsBrowse all security →

Top Security Claude Skills

security

AI Code Quality Auditor

Audit AI-generated or rapidly iterated code for structural flaws, security risks, and production readiness across seven dimensions.

Ssickn33
31.7k stars
security

GitHub Actions AI Security Auditor

Audit GitHub Actions workflows for security vulnerabilities in AI agent integrations by detecting attack vectors where attacker-controlled input reaches CI/CD-deployed agents.

Ssickn33
30.7k stars
Featured
security

Spring Boot Security Best Practices

Implement authentication, authorization, input validation, CSRF protection, and secrets management in Spring Boot applications.

AAffaan M
156.5k stars
security

API Fuzzing for Bug Bounty

Execute systematic fuzzing attacks on REST, SOAP, and GraphQL APIs to discover vulnerabilities including IDOR, authentication bypass, and injection flaws.

Ssickn33
30.7k stars
security

Azure Identity Rust Authentication

Authenticate Rust applications to Azure using DeveloperToolsCredential, ManagedIdentityCredential, or ClientSecretCredential with Microsoft Entra ID.

Ssickn33
30.7k stars
security

Azure Key Vault Keys Rust

Create, manage, and perform cryptographic operations on keys stored in Azure Key Vault using Rust SDK with complete code examples.

Ssickn33
30.7k stars
security

Azure Key Vault Secrets Rust

Authenticate and manage secrets in Azure Key Vault using Rust SDK with get, set, delete, and version control operations.

Ssickn33
30.7k stars
security

Binary Assembly Analysis Patterns

Decode compiled binaries using x86-64, ARM64, and ARM32 assembly patterns with calling conventions, control flow, and function structure recognition.

Ssickn33
30.7k stars
security

Broken Authentication Testing

Test web applications for authentication vulnerabilities using systematic methodology across password policies, session handling, brute force, and credential stuffing attacks.

Ssickn33
30.7k stars
security

Burp Suite Project Parser

Extract and search HTTP traffic, headers, and audit findings from Burp Suite project files using regex patterns and targeted filters.

Ssickn33
30.7k stars
security

Security Code Review Checklist

Review code for vulnerabilities across secrets, input validation, SQL injection, and authentication using domain-specific checklists and safe code patterns.

Ssickn33
30.7k stars
security

Repository Claude Settings Auditor

Analyze repository structure and generate safe Claude Code settings.json permissions for read-only bash commands.

Ssickn33
30.9k stars
security

Differential Security Review

Conduct risk-first security code reviews on PRs with evidence-based findings, blast radius analysis, and adversarial modeling.

Ssickn33
30.9k stars
security

FDA MedTech Compliance Auditor

Audit medical device software against 21 CFR Part 820, IEC 62304, and ISO 13485 with severity-ranked findings and corrective actions.

Ssickn33
30.9k stars
security

FFUF Web Fuzzing

Execute advanced web fuzzing for penetration testing using FFUF with multi-wordlist modes, authenticated requests, and intelligent filtering.

Ssickn33
30.9k stars
security

GitHub Actions Security Reviewer

Audit GitHub Actions workflows for exploitable vulnerabilities using real attack patterns, requiring concrete exploitation scenarios for every finding.

Ssickn33
31.2k stars
security

HTML Injection Testing

Identify and exploit HTML injection vulnerabilities in web applications using structured testing phases, payload examples, and remediation guidance.

Ssickn33
31.2k stars
security

IDOR Vulnerability Testing

Systematically identify and exploit Insecure Direct Object Reference vulnerabilities using parameter manipulation, enumeration, and Burp Suite techniques.

Ssickn33
31.2k stars
security

Lightning Network Architecture Review

Review Bitcoin Lightning Network protocol designs, compare channel factory approaches, and analyze Layer 2 scaling tradeoffs with expert-level depth.

Ssickn33
31.2k stars
security

Odoo Access Control Expert

Write correct Odoo security rules: ir.model.access.csv entries, ir.rule record restrictions, and multi-company access patterns.

Ssickn33
31.4k stars
security

Penetration Testing Checklist

Execute comprehensive penetration tests using structured phases for scoping, preparation, execution, and remediation with specific task workflows.

Ssickn33
31.4k stars
security

Penetration Testing Command Reference

Provide quick lookup for nmap, Metasploit, and exploitation commands during authorized security assessments.

Ssickn33
31.4k stars
security

Privacy by Design Framework

Build privacy protections into app architecture from day one using GDPR, CCPA, LGPD principles—data minimization, consent, encryption, user rights.

Ssickn33
31.4k stars
security

Spec-to-Code Compliance Auditor

Verify blockchain code implements exact specification requirements by comparing against whitepapers and design documents with evidence-based gap analysis.

Ssickn33
31.7k stars

Frequently Asked Questions

Can Claude Skills help with penetration testing?

Yes. The Security category includes skills for recon, attack surface mapping, vulnerability identification, and pentest report writing — all designed for authorized security testing contexts.

Are there Claude Skills for code security review?

Several highly-rated skills in both Development and Security categories focus on identifying insecure code patterns: SQL injection, XSS, SSRF, auth flaws, and dependency vulnerabilities.

Who creates the security Claude Skills?

Security skills come from verified security researchers, pen testing firms, and organizations like Trail of Bits. Creator verification is shown on each skill page.

Looking for something specific?

Search all skillsBrowse directory