40 results (83.5ms) page 1 / 2
samhvw8 / dot-claude-research exact

Technical research methodology with YAGNI/KISS/DRY principles. Phases: scope definition, information gathering, analysis, synthesis, recommendation. Capabilities: technology evaluation,...

agamm / claude-code-owasp-owasp-security exact

Use when reviewing code for security vulnerabilities, implementing authentication/authorization, handling user input, or discussing web application security. Covers OWASP Top 10:2025, ASVS 5.0,...

gmh5225 / awesome-game-security-windows-kernel-security exact

Guide for Windows kernel security research including driver development, system callbacks, security features, and kernel exploitation. Use this skill when working with Windows drivers, PatchGuard,...

alinaqi / claude-bootstrap-security exact

OWASP security patterns, secrets management, security testing

arielperez82 / agents-and-skills-research exact

Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable.

binjuhor / shadcn-lar-research exact

Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable.

ngxtm / devkit-research exact

Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable.

binhmuc / autobot-review-research exact

Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable.

semgrep / skills-code-security exact

Security guidelines for writing secure code. Use when writing code, reviewing code for vulnerabilities, or asking about secure coding practices like "check for SQL injection" or "review security".

bitwize-music-studio / claude-ai-music-skills-researchers-security exact

Malware analysis, CVEs, attribution reports, hacker communities

omer-metin / skills-for-antigravity-security exact

One breach = game over. Threat modeling, OWASP Top 10, secure coding, security architecture, zero trust. The complete security skill for protecting your application from day one. Security isn't a...

rshankras / claude-code-apple-skills-security exact

Security review and guidance for iOS, macOS, and watchOS apps. Covers secure storage, biometric authentication, network security, and platform-specific patterns. Use when implementing security...

hyperb1iss / hyperskills-security exact

Use this skill when doing security reviews, penetration testing, threat modeling, compliance work, or incident response. Activates on mentions of security audit, vulnerability, penetration test,...

404kidwiz / agent-skills-backup-security-scanning-security-dependencies exact

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities,...

rmyndharis / antigravity-skills-security-scanning-security-dependencies exact

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities,...

halay08 / fullstack-agent-skills-security-scanning-security-dependencies exact

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities,...

semgrep / skills-llm-security exact

Security guidelines for LLM applications based on OWASP Top 10 for LLM 2025. Use when building LLM apps, reviewing AI security, implementing RAG systems, or asking about LLM vulnerabilities like...

johnlindquist / claude-research exact

Comprehensive research combining web search and AI synthesis. Use for deep research on topics, comparing technologies, investigating libraries, and finding GitHub issues related to problems.

OpenHands / skills-security exact

Security best practices for secure coding, authentication, authorization, and data protection. Use when developing features that handle sensitive data, user authentication, or require security review.

ronnycoding / claude-secure-web-search exact

Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check...