Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE),...
Security
Security scanning, authentication, and vulnerability detection
Update the thinking dashboard after sessions. Scans sessions and updates stats.
Security audit workflow - vulnerability scan → verification
Search Robot Framework library/resource/suite documentation to find matching keywords for a use case. Use when asked...
Run local safety scans on Agent Skills before publishing. Detects secrets, dangerous code patterns, and analyzes...
Language and naming conventions advisor for worldbuilding. Creates consistent naming systems, develops linguistic...
NextDNS API integration best practices for authentication, profile management, analytics, logs, and real-time...
Use when storing credentials in OCI Vault, troubleshooting secret retrieval failures, implementing secret rotation,...
Master smart contract security with auditing, vulnerability detection, and incident response
Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and...
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports",...
Build Slack apps using the Bolt framework across Python, JavaScript, and Java. Covers Block Kit for rich UIs,...
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
Translates boring corporate speak into authentic 17th-century pirate lingo.
Expert guidance for Nchan, a scalable pub/sub server for Nginx. Use this skill when you need to configure Nchan...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
DevSecOps skill for security automation, vulnerability management, secure CI/CD pipelines, container security,...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...