Application security testing coordinator for common vulnerability patterns including XSS, injection flaws, and client-side security issues. Orchestrates specialized testing agents to identify and...
Orchestrate parallel scientist agents for comprehensive research with AUTO mode
|
Look up current research information using Perplexity Sonar Pro Search or Sonar Reasoning Pro models through OpenRouter. Automatically selects the best model based on query complexity. Search...
Static Application Security Testing (SAST) for code vulnerability
Static Application Security Testing (SAST) for code vulnerability
Static Application Security Testing (SAST) for code vulnerability
Authentication testing skill for authorized penetration testing - automates signup, login, 2FA bypass, CAPTCHA solving, and bot detection evasion using Playwright MCP. Tests authentication...
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Research skill for gathering facts, data, and sources on a given topic. Activates when the task requires finding current information, statistics, expert opinions, or real-world examples before...
Guide for mobile game security on Android and iOS platforms. Use this skill when working with Android/iOS reverse engineering, mobile game hacking, APK analysis, root/jailbreak detection bypass,...
Deep research via Gemini CLI β runs in background sub-agent.
Deep research on a topic, creating persistent documentation for future reference. Use for technology decisions, competitive analysis, or complex topics.
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware",...
Implement secure coding practices following OWASP Top 10. Use when preventing security vulnerabilities, implementing authentication, securing APIs, or conducting security reviews. Triggers on...
Implement secure coding practices following OWASP Top 10. Use when preventing security vulnerabilities, implementing authentication, securing APIs, or conducting security reviews. Triggers on...
Performs comprehensive security audits identifying vulnerabilities, misconfigurations, and security best practice violations across applications, APIs, infrastructure, and data pipelines. Covers...
Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing. Includes security assessment tools, threat modeling, crypto...