Claude Code skill for running structured security audits with actionable remediation plans
Security
Security scanning, authentication, and vulnerability detection
>
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
WS-Discovery protocol scanner for discovering and enumerating ONVIF cameras and IoT devices on the network. Use when...
ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess...
Professional network reconnaissance and port scanning using nmap. Supports various scan types (quick, full, UDP,...
Skill for creating auth layers in TypeScript/JavaScript apps using Better Auth.
Skill for integrating Better Auth - the comprehensive TypeScript authentication framework.
Quick security audit checklist covering authentication, function exposure, argument validation, row-level access...
Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and...
Use when implementing authentication. Use when storing passwords. Use when asked to store credentials insecurely.
One breach = game over. Threat modeling, OWASP Top 10, secure coding, security architecture, zero trust. The...
Expert at securing web applications against OWASP Top 10 vulnerabilities. Covers authentication, authorization,...
World-class application security - OWASP Top 10, secure coding patterns, and the battle scars from security...
Security engineering that protects applications, data, and users from real-world threatsUse when "security,...
Electron desktop application architect. Use when designing Electron apps, implementing IPC communication, handling...
Master smart contract security with auditing, vulnerability detection, and incident response
Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored...
Check version compatibility, breaking changes, and security vulnerabilities
Scan codebase for security vulnerabilities including secrets, insecure
Auto-activates during requirements analysis to assess security risks
Verify compliance with OWASP Top 10 2021 security standards. Use when
Security best practices for secure coding, authentication, authorization, and data protection. Use when developing...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...