4993 results (40.0ms) page 10 / 250
404kidwiz / agent-skills-backup-wcag-audit-patterns exact

Conduct WCAG 2.2 accessibility audits with automated testing, manual verification, and remediation guidance. Use when auditing websites for accessibility, fixing WCAG violations, or implementing...

majiayu000 / claude-arsenal-auth-security exact

OAuth 2.1 + JWT authentication security best practices. Use when implementing auth, API authorization, token management. Follows RFC 9700 (2025).

sickn33 / antigravity-awesome-skills-ssh-penetration-testing exact

This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or...

sickn33 / antigravity-awesome-skills-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

aj-geddes / useful-ai-prompts-network-security-groups exact

Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.

proffesor-for-testing / agentic-qe-security-visual-testing exact

Security-first visual testing combining URL validation, PII detection, and visual regression with parallel viewport support. Use when testing web applications that handle sensitive data, need...

dirnbauer / webconsulting-skills-security-incident-reporting exact

Security Incident Report templates drawing from NIST/SANS. DDoS post-mortem, CVE correlation, timeline documentation, and blameless root cause analysis.

404kidwiz / claude-supercode-skills-ad-security-reviewer exact

Use when user needs Active Directory security analysis, privileged group design review, authentication policy assessment, or delegation and attack surface evaluation across enterprise domains.

mindrally / skills-jwt-security exact

Guidelines for implementing JWT authentication with security best practices for token creation, validation, and storage