Auditing for unsafe code and secrets.
Security
Security scanning, authentication, and vulnerability detection
AccessorySetupKit for privacy-preserving discovery and setup of Bluetooth, Wi-Fi, or Wi-Fi Aware accessories. Use...
Security vulnerability detection and variant analysis skill. Use when hunting for dangerous APIs, footgun patterns,...
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
Validate positioning, authority, and messaging strategy using Expert Secrets principles. Assess Attractive...
Build Slack apps using the Bolt framework across Python, JavaScript, and Java. Covers Block Kit for rich UIs,...
Analyzes content for E-E-A-T signals and suggests improvements to
Static Application Security Testing (SAST) for code vulnerability
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain...
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports",...
Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...
Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
Security-first PR review checklist for this repo. Use when reviewing diffs/PRs, especially changes involving auth,...
Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE),...
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development...
The ultimate authentication and authorization skill. Implement login, signin, signup, registration, OAuth, 2FA, MFA,...
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build...