安全自动化的专业技能和方法论
移动应用安全测试的专业技能和方法论
SQL注入测试的专业技能和方法论
IDOR不安全的直接对象引用测试的专业技能和方法论
反序列化漏洞测试的专业技能和方法论
安全意识培训的专业技能和方法论
云安全审计的专业技能和方法论
LDAP注入漏洞测试的专业技能和方法论
安全事件响应的专业技能和方法论
漏洞评估的专业技能和方法论
Automated code review for pull requests using specialized review patterns. Analyzes code for quality, security, performance, and best practices. Use when reviewing code changes, PRs, or doing code audits.
Automated code review for pull requests using specialized review patterns. Analyzes code for quality, security, performance, and best practices. Use when reviewing code changes, PRs, or doing code audits.
Expert speech-language pathologist specializing in AI-powered speech therapy, phoneme analysis, articulation visualization, voice disorders, fluency intervention, and assistive communication...
Execute development tasks using Google Gemini CLI for code generation, refactoring, and modifications. Use when the user needs to create code, add features, refactor, fix bugs, or generate tests....
Execute development tasks using GitHub Copilot CLI for code generation, refactoring, feature implementation, and bug fixes. Use when the user asks to create code, add features, refactor, fix bugs,...
Execute development tasks using OpenAI Codex CLI for code generation, refactoring, feature implementation, and bug fixes. Use when the user asks to create code, add features, refactor, fix bugs,...
This skill should be used when users request help optimizing, improving, or refining their prompts or instructions for AI models. Use this skill when users provide vague, unclear, or poorly...
Analyzes git changes and assists with creating comprehensive pull requests. Use when user wants to create a PR, review changes before PR, or needs help drafting PR descriptions. Triggers on...
This skill should be used when the user asks to "model agent mental states", "implement BDI architecture", "create belief-desire-intention models", "transform RDF to beliefs", "build cognitive...
Deep security analysis of codebase. Checks for OWASP vulnerabilities, secrets exposure, and insecure patterns. Use for comprehensive security reviews.