Search by job
Describe what you want your agent to do.
Open a skill
Check creator, source, and instructions.
Use instantly
Copy the command or download SKILL.md.
Security Review
Identify vulnerabilities and enforce security best practices across authentication, input validation, and sensitive operations.
Semgrep Rule Language Porter
Port existing Semgrep security rules to new target languages with applicability analysis and test-driven validation.
Binary Assembly Analysis Patterns
Decode compiled binaries using x86-64, ARM64, and ARM32 assembly patterns with calling conventions, control flow, and function structure recognition.
SAST Code Vulnerability Scanner
Scan source code across 7 languages for injection, secrets, and framework vulnerabilities using Bandit, ESLint, Semgrep with triage workflow.
Shodan Reconnaissance For Pentesting
Systematically discover exposed services, vulnerable systems, and IoT devices using Shodan's API, CLI, and search filters during authorized penetration testing.
Spec-to-Code Compliance Auditor
Verify blockchain code implements exact specification requirements by comparing against whitepapers and design documents with evidence-based gap analysis.
Smart Contract Guidelines Advisor
Analyzes smart contract codebases against Trail of Bits best practices, generating documentation and security recommendations.
Django Security Best Practices
Implement Django authentication, authorization, CSRF protection, and secure production configurations
Web Vulnerabilities Reference Guide
Reference 100+ critical web vulnerabilities organized by category with root causes, impacts, and specific mitigations for systematic security testing.
Variant Analysis for Security
Find similar vulnerabilities across codebases using pattern-based analysis with ripgrep, Semgrep, and CodeQL after identifying an initial issue.
Burp Suite Project Parser
Extract and search HTTP traffic, headers, and audit findings from Burp Suite project files using regex patterns and targeted filters.
Laravel Security Best Practices
Implement authentication, authorization, CSRF protection, validation, and secure deployment in Laravel applications.
Laravel Security Best Practices
Implement authentication, authorization, CSRF protection, input validation, and secure deployment for Laravel applications.
Substrate Pallet Vulnerability Scanner
Scan Substrate/FRAME pallets for 7 critical vulnerabilities: arithmetic overflow, panic DoS, weight miscalculation, unsafe storage writes, unsigned validation gaps, bad randomness, and origin checks.
CISO Advisor
Quantify security risks in dollars, build compliance roadmaps, and architect zero-trust strategies for growth companies.
Differential Security Code Review
Perform risk-focused security analysis of code changes with blast radius calculation, test coverage assessment, and comprehensive markdown reports.
Ransomware Leak Site Intelligence Analysis
Monitor and analyze ransomware group data leak sites to extract threat intelligence on victim patterns, group tactics, and sector-specific risk.
Semgrep Rule Creator
Create production-quality Semgrep rules for detecting security vulnerabilities and code patterns with mandatory testing and validation.
Fuzzing Coverage Analysis
Measure code coverage during fuzzing to assess harness effectiveness and identify fuzzing blockers.
Security Scan with AgentShield
Scan Claude Code configurations for security vulnerabilities, misconfigurations, and injection risks.
Semgrep Security Scan
Run parallel Semgrep static analysis with automatic language detection, Pro support, and merged SARIF output.
AddressSanitizer Memory Error Detection
Configure and deploy AddressSanitizer to detect buffer overflows and memory corruption bugs during C/C++ fuzzing campaigns.
Wycheproof Cryptographic Testing
Validate cryptographic implementations against Google's test vectors for known attacks and edge cases.
TON Vulnerability Scanner
Scans TON smart contracts for critical security vulnerabilities in FunC code including sender validation, integer overflow, and gas handling issues.
Cosmos Vulnerability Scanner
Scans Cosmos SDK blockchains for 9 consensus-critical vulnerabilities including non-determinism and rounding errors.
LibAFL Fuzzing Library
Build custom fuzzers using modular LibAFL library for advanced security testing.
Supply Chain Risk Auditor
Identify dependencies at heightened risk of exploitation or takeover by analyzing supply chain attack surface.
ISO 27001 ISMS Audit Expert
Execute ISO 27001 internal/external audits with risk-based scheduling, control assessment, nonconformity classification, and certification support workflows.
Lightning Network Architecture Review
Review Bitcoin Lightning Network protocol designs, compare channel factory approaches, and analyze Layer 2 scaling tradeoffs with expert-level depth.
Agentic Identity Trust Architect
Design cryptographic identity, authentication, and trust verification systems for autonomous multi-agent environments with zero-trust architecture.
Sharp Edges Security Analysis
Identifies footgun APIs, dangerous defaults, and security-misuse designs that enable developer mistakes.
AWS Penetration Testing Framework
Execute systematic AWS penetration tests covering IAM enumeration, privilege escalation, metadata exploitation, and persistence techniques for red team assessments.
File Path Traversal Testing
Identify and exploit file path traversal vulnerabilities to read arbitrary server files including credentials and source code.
Security Penetration Testing
Perform systematic offensive security testing to discover vulnerabilities through authorized penetration testing and vulnerability assessments.
SARIF File Parsing
Parse, filter, deduplicate, and convert static analysis results from SARIF files into actionable security findings.
Senior Security Engineer Toolkit
Conduct threat modeling, vulnerability analysis, secure architecture design, and penetration testing using STRIDE methodology.
Claude API Security Best Practices
Secure Claude API integrations with key management, prompt injection defense, and output validation techniques.
FFUF Web Fuzzing
Execute advanced web fuzzing for penetration testing using FFUF with multi-wordlist modes, authenticated requests, and intelligent filtering.
API Fuzzing for Bug Bounty
Execute systematic fuzzing attacks on REST, SOAP, and GraphQL APIs to discover vulnerabilities including IDOR, authentication bypass, and injection flaws.
Guard Full Safety Mode
Activate destructive command warnings and directory-scoped edit restrictions for maximum safety.
GitHub Actions AI Security Auditor
Audit GitHub Actions workflows for security vulnerabilities in AI agent integrations by detecting attack vectors where attacker-controlled input reaches CI/CD-deployed agents.
Secure API Design Implementation
Implement authentication, authorization, input validation, rate limiting, and OWASP API Top 10 protections for REST, GraphQL, and WebSocket APIs.
GitHub Actions AI Security Auditor
Audit GitHub Actions workflows for prompt injection vulnerabilities in AI agent integrations using static analysis.
AI Code Quality Auditor
Audit AI-generated or rapidly iterated code for structural flaws, security risks, and production readiness across seven dimensions.
Azure Key Vault Keys Rust
Create, manage, and perform cryptographic operations on keys stored in Azure Key Vault using Rust SDK with complete code examples.
Django IDOR & Access Control Auditor
Systematically investigate Django authorization implementations to find IDOR and access control vulnerabilities through code tracing and ownership model analysis.
Azure Key Vault Secrets Rust
Authenticate and manage secrets in Azure Key Vault using Rust SDK with get, set, delete, and version control operations.
Bypass Fuzzing Obstacles
Patch code with conditional compilation to overcome checksums, global state, and validation barriers during fuzzing.