Comprehensive security assessment across application, cloud, container, IAM, network, OS, supply chain, and zero trust using NIST CSF 2.0.
Expert in secure mobile coding practices specializing in input
Expert in secure mobile coding practices specializing in input
Expert in secure mobile coding practices specializing in input
Expert in secure backend coding practices specializing in input
Expert in secure backend coding practices specializing in input
Expert in secure backend coding practices specializing in input
Expert in secure frontend coding practices specializing in XSS
Expert in secure frontend coding practices specializing in XSS
Expert in secure frontend coding practices specializing in XSS
ๅฎๅ จ่ชๅจๅ็ไธไธๆ่ฝๅๆนๆณ่ฎบ
Domain reconnaissance coordinator that orchestrates subdomain discovery and port scanning to build comprehensive domain attack surface inventory
Assists in writing high-quality content by conducting research, adding
Security auditing, vulnerability scanning, and compliance validation for OWASP, SOC2, GDPR, and other standards.
Master smart contract security with auditing, vulnerability detection, and incident response
Evaluate cloud security posture across AWS, Azure, and GCP with storage exposure checks, IAM policy review, and encryption validation.
Comprehensive market analysis using web research, data synthesis, and competitive positioning
Guide for security-related Agent Skills including penetration testing, code auditing, threat hunting, and forensics skills.
Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.
Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP...