Usage examples and documentation
cat ~/Nuevo
Explora los skills más recientes añadidos al marketplace
Grafana/CloudWatch dashboard configuration for SLO tracking
Evaluate zero-trust architecture maturity using CISA ZTMM with identity verification, device trust,...
Design zero-trust architectures with identity-centric security, micro-segmentation, continuous verification, and...
Validate software supply chain security with SBOM generation, dependency scanning, provenance verification, and SLSA...
Verify operating system hardening using CIS benchmarks with patch management, kernel hardening, and host-based...
Validate network security architecture with firewall rule analysis, segmentation verification, and defense-in-depth...
Review identity and access management using NIST SP 800-63B guidelines with MFA enforcement, password policy, and...
Validate cryptographic implementations using NIST standards with TLS configuration, cipher suite analysis, and...
Validate container and Kubernetes security using CIS benchmarks with pod security standards, RBAC review, and image...
Evaluate cloud security posture across AWS, Azure, and GCP with storage exposure checks, IAM policy review, and...
Comprehensive security assessment across application, cloud, container, IAM, network, OS, supply chain, and zero...
Validate application security using OWASP Top 10 2021 and API Security Top 10 guidelines with injection prevention...
Integrate secrets management (Vault, AWS, Azure, GCP) with rotation policies, access controls, and Kubernetes/CI/CD...
Review Rust code for memory safety, concurrency patterns, performance optimization, and ecosystem tooling (cargo,...
Generate incident response playbooks for security incidents, outages, and disaster recovery with NIST SP 800-61...
Evaluate code quality across 8+ languages using language-agnostic principles and language-specific best practices.
SLO compliance report with error budget burn rate
Grafana or CloudWatch dashboard definitions
Alert rules based on error budget consumption
Configure Prometheus with alerting, recording rules, service discovery (K8s, Consul, EC2), federation, PromQL...
Required CI secrets and environment variables
Manage ML model lifecycle from development to deployment with experiment tracking, versioning, monitoring, and...
Apply microservices patterns (Saga, CQRS, Event Sourcing, Circuit Breaker, API Gateway, Service Discovery) with...