5515 results (45.6ms) page 22 / 276
zebbern / claude-code-guide-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

ngxtm / devkit-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

404kidwiz / agent-skills-backup-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

automindtechnologie-jpg / ultimate-skill-md-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

shishiv / gsd-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

cleodin / antigravity-awesome-skills-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

halay08 / fullstack-agent-skills-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

synaptiai / agent-capability-standard-critique exact

Find failure modes, edge cases, ambiguities, and exploit paths in plans, code, or designs. Use when reviewing proposals, auditing security, stress-testing logic, or validating assumptions.

404kidwiz / agent-skills-backup-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

halay08 / fullstack-agent-skills-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

rmyndharis / antigravity-skills-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

shishiv / gsd-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

mrgoonie / claudekit-skills-devops exact

Deploy to Cloudflare (Workers, R2, D1), Docker, GCP (Cloud Run, GKE), Kubernetes (kubectl, Helm). Use for serverless, containers, CI/CD, GitOps, security audit.

ovachiever / droid-tings-pci-compliance exact

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card...

404kidwiz / agent-skills-backup-pci-compliance exact

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card...

shishiv / gsd-pci-compliance exact

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card...

rmyndharis / antigravity-skills-pci-compliance exact

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card...

halay08 / fullstack-agent-skills-pci-compliance exact

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card...

martinholovsky / claude-skills-generator-cilium-expert exact

Expert in Cilium eBPF-based networking and security for Kubernetes. Use for CNI setup, network policies (L3/L4/L7), service mesh, Hubble observability, zero-trust security, and cluster-wide...

DonTizi / codegeass-code-review exact

Automated code review with focus on security, performance, and maintainability. Use when reviewing code changes, PRs, or performing scheduled audits.