Auto-activates during requirements analysis to assess security risks
Security
Security scanning, authentication, and vulnerability detection
Verify compliance with OWASP Top 10 2021 security standards. Use when
Security best practices for secure coding, authentication, authorization, and data protection. Use when developing...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
Security auditing for code vulnerabilities (OWASP Top 10, XSS, SQL injection) and dependency scanning (pnpm audit,...
Security analysis, vulnerability assessment, and security code reviews
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single...
Auditing for unsafe code and secrets.
AccessorySetupKit for privacy-preserving discovery and setup of Bluetooth, Wi-Fi, or Wi-Fi Aware accessories. Use...
Security vulnerability detection and variant analysis skill. Use when hunting for dangerous APIs, footgun patterns,...
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
Validate positioning, authority, and messaging strategy using Expert Secrets principles. Assess Attractive...
Build Slack apps using the Bolt framework across Python, JavaScript, and Java. Covers Block Kit for rich UIs,...
Analyzes content for E-E-A-T signals and suggests improvements to
Static Application Security Testing (SAST) for code vulnerability
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain...
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports",...
Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...