4993 results (51.0ms) page 11 / 250
mblode / agent-skills-audit-ui exact

Final UI quality audit for typography, accessibility, and UX polish. Use when reviewing or refining UI before release.

gabriel-tecnologia / gab-claude-engineering-security-review exact

Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. It provides a comprehensive security...

danielaskdd / doc-audit-doc-audit exact

Intelligent document audit system for syntax and semantic verification, legal or technical document compliance review using LLM (exclusive .docx support).

madsnorgaard / agent-resources-drupal-security exact

Drupal security expertise. Auto-activates when writing forms, controllers, queries, or handling user input. Prevents XSS, SQL injection, and access bypass vulnerabilities.

tommygeoco / ui-audit exact

AI skill for automated UI audits. Evaluate interfaces against proven UX principles for visual hierarchy, accessibility, cognitive load, navigation, and more. Based on Making UX Decisions by Tommy Geoco.

Bbeierle12 / skill-mcp-claude-form-security exact

Security patterns for web forms including autocomplete attributes for password managers, CSRF protection, XSS prevention, and input sanitization. Use when implementing authentication forms,...

jamditis / claude-skills-journalism-secure-auth exact

Secure authentication implementation patterns. Use when implementing user login, registration, password reset, session management, JWT authentication, or OAuth integration. Provides...

proffesor-for-testing / agentic-qe-n8n-security-testing exact

Credential exposure detection, OAuth flow validation, API key management testing, and data sanitization verification for n8n workflows. Use when validating n8n workflow security.

samhvw8 / dot-claude-repomix exact

Repository packaging for AI/LLM analysis. Capabilities: pack repos into single files, generate AI-friendly context, codebase snapshots, security audit prep, filter/exclude patterns, token...

Ed1s0nZ / cyberstrikeai-security-automation exact

ๅฎ‰ๅ…จ่‡ชๅŠจๅŒ–็š„ไธ“ไธšๆŠ€่ƒฝๅ’Œๆ–นๆณ•่ฎบ

philoserf / claude-code-setup-output-style-audit exact

Validates output-style persona definitions, behavior specifications, and keep-coding-instructions decisions. Use when auditing, reviewing, or improving output-styles, checking persona clarity,...

netresearch / enterprise-readiness-skill-enterprise-readiness exact

Assess and enhance software projects for enterprise-grade security, quality, and automation. This skill should be used when evaluating projects for production readiness, implementing supply chain...

schwepps / skills-solidity-auditor exact

Professional-grade Solidity smart contract security auditor. Performs comprehensive audits or targeted reviews (security vulnerabilities, gas optimization, storage optimization, code architecture,...

omer-metin / skills-for-antigravity-smart-contract-auditor exact

Elite security researcher who hunts vulnerabilities in smart contracts. Has found critical bugs worth millions in TVL. Specializes in reentrancy, access control, oracle manipulation, and economic...

aj-geddes / useful-ai-prompts-security-headers-configuration exact

Configure HTTP security headers including CSP, HSTS, X-Frame-Options, and XSS protection. Use when hardening web applications against common attacks.

schwepps / skills-seo-content-audit exact

Comprehensive on-page SEO and content quality audit covering title tags, meta descriptions, header structure, keyword optimization, E-E-A-T signals, readability, and content scoring. Use when...

timbenniks / timbenniks-agent-skills-sdk-readiness-audit exact

Audit an API surface (OpenAPI 3.0/3.1, GraphQL schema, or REST docs) for SDK readiness and developer experience. Use when asked to evaluate whether an API is SDK friendly, produce a readiness...

ngxtm / devkit-api-security-best-practices exact

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities