40 results (10.4ms) page 1 / 2
transilienceai / communitytools-cve-testing exact

CVE vulnerability testing coordinator that identifies technology stacks, researches known vulnerabilities, and tests applications for exploitable CVEs using public exploits and proof-of-concept code.

proffesor-for-testing / agentic-qe-v3-security-overhaul exact

Complete security architecture overhaul for claude-flow v3. Addresses critical CVEs (CVE-1, CVE-2, CVE-3) and implements secure-by-default patterns. Use for security-first v3 implementation.

cosmix / loom-dependency-scan exact

Scans project dependencies for known vulnerabilities, outdated packages, and license compliance issues. Supports vulnerability scanning (CVE detection), SBOM generation, license compliance...

christianearle01 / claude-config-template-security-scanner exact

Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored vulnerability reports.

dirnbauer / webconsulting-skills-security-incident-reporting exact

Security Incident Report templates drawing from NIST/SANS. DDoS post-mortem, CVE correlation, timeline documentation, and blameless root cause analysis.

aj-geddes / useful-ai-prompts-vulnerability-scanning exact

Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.

DauQuangThanh / hanoi-rainbow-code-security-review exact

Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE), authentication/authorization flaws, injection attacks, cryptography issues, sensitive data...

cosmix / loom-security-audit exact

Performs comprehensive security audits identifying vulnerabilities, misconfigurations, and security best practice violations across applications, APIs, infrastructure, and data pipelines. Covers...

luiscamaral / k8s-cell-platform-skills-security-audit exact

Audits Kubernetes security posture including RBAC permissions, network policies, pod security, and compliance. Use for security reviews, RBAC analysis, permission checks, network policy...

hyperb1iss / hyperskills-security exact

Use this skill when doing security reviews, penetration testing, threat modeling, compliance work, or incident response. Activates on mentions of security audit, vulnerability, penetration test,...

erichowens / some-claude-skills-security-auditor exact

Security vulnerability scanner and OWASP compliance auditor for codebases. Dependency scanning (npm audit, pip-audit), secret detection (high-entropy strings, API keys), SAST for injection/XSS...

tauri 0.03
martinholovsky / claude-skills-generator-tauri exact

Cross-platform desktop application framework combining Rust backend with web frontend, emphasizing security and performance

proffesor-for-testing / agentic-qe-v3-swarm-coordination exact

15-agent hierarchical mesh coordination for v3 implementation. Orchestrates parallel execution across security, core, and integration domains following 10 ADRs with 14-week timeline.

martinholovsky / claude-skills-generator-harbor-expert exact

Expert Harbor container registry administrator specializing in registry operations, vulnerability scanning with Trivy, artifact signing with Notary, RBAC, and multi-region replication. Use when...

martinholovsky / claude-skills-generator-fastapi exact

REST API and WebSocket development with FastAPI emphasizing security, performance, and async patterns

martinholovsky / claude-skills-generator-llm-integration exact

Expert skill for integrating local Large Language Models using llama.cpp and Ollama. Covers secure model loading, inference optimization, prompt handling, and protection against LLM-specific...

martinholovsky / claude-skills-generator-vue-nuxt exact

Vue 3 and Nuxt 3 for JARVIS AI Assistant UI development with security-first patterns

hardw00t / ai-security-arsenal-sca-security exact

Software Composition Analysis skill for identifying vulnerable dependencies, license compliance, and supply chain security. This skill should be used when scanning dependencies for CVEs, analyzing...