8849 results (60.5ms) page 12 / 443
gmh5225 / awesome-game-security-awesome-game-security-overview exact

Guide for understanding and contributing to the awesome-game-security curated resource list. Use this skill when adding new resources, organizing categories, understanding project structure, or...

omer-metin / skills-for-antigravity-ai-safety-alignment exact

Implement comprehensive safety guardrails for LLM applications including content moderation (OpenAI Moderation API), jailbreak prevention, prompt injection defense, PII detection, topic...

TaylorHuston / local-life-manager-security-audit exact

Comprehensive security audit of codebase using multiple security-auditor agents. Use before production deployments or after major features.

404kidwiz / agent-skills-backup-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

halay08 / fullstack-agent-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

rmyndharis / antigravity-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

RichardoC / skills-lightweight-security-review exact

Conducts a comprehensive security review of a git repo. Use when asked about security issues, code quality concerns, or to evaluate the security posture of a codebase or library.

TencentCloudBase / skills-ai-model-web exact

Use this skill when developing browser/Web applications (React/Vue/Angular, static websites, SPAs) that need AI capabilities. Features text generation (generateText) and streaming (streamText) via...

bgauryy / octocode-mcp-octocode-research exact

This skill should be used when the user asks to "research code", "how does X work", "where is Y defined", "who calls Z", "trace code flow", "find usages", "review a PR", "explore this library",...

bgauryy / octocode-mcp-octocode-documentaion-writer exact

Generate comprehensive documentation with intelligent orchestration and parallel execution

shipshitdev / library-security-expert exact

Expert in application security, OWASP Top 10, authentication, authorization, data protection, and security best practices for React, Next.js, and NestJS applications

dirnbauer / webconsulting-skills-security-audit exact

Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring.

sickn33 / antigravity-awesome-skills-computer-use-agents exact

Build AI agents that interact with computers like humans do - viewing screens, moving cursors, clicking buttons, and typing text. Covers Anthropic's Computer Use, OpenAI's Operator/CUA, and...

TheSimpleApp / agent-skills-security-review exact

Review code for security vulnerabilities using OWASP guidelines, static analysis patterns, and secure coding practices. Use when auditing code, reviewing PRs, or checking for vulnerabilities.

itechmeat / llm-code-pydantic-ai exact

Build production AI agents with Pydantic AI: type-safe tools, structured output, embeddings, MCP, 30+ model providers, evals, graphs, and observability.

aj-geddes / useful-ai-prompts-security-testing exact

Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security test, vulnerability scanning, OWASP, SQL injection, XSS, CSRF, and penetration testing.

TencentCloudBase / skills-ai-model-wechat exact

Use this skill when developing WeChat Mini Programs (小程序, 企业微信小程序, wx.cloud-based apps) that need AI capabilities. Features text generation (generateText) and streaming (streamText) with callback...

Jeffallan / claude-skills-secure-code-guardian exact

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP...

getsentry / agent-skills-sentry-setup-ai-monitoring exact

Setup Sentry AI Agent Monitoring in any project. Use when asked to monitor LLM calls, track AI agents, or instrument OpenAI/Anthropic/Vercel AI/LangChain/Google GenAI. Detects installed AI SDKs...

Nirusan / claude-config-security-check exact

Red-team security audit for code changes. Use automatically when working on authentication, authorization, user inputs, API endpoints, database queries, or any security-sensitive code. Also use...