9771 results (86.5ms) page 24 / 489
KhazP / vibe-coding-prompt-template-vibe-agents exact

Generate AGENTS.md and AI configuration files for your project. Use when the user wants to create agent instructions, set up AI configs, or says "create AGENTS.md", "configure my AI assistant", or...

synaptiai / agent-capability-standard-critique exact

Find failure modes, edge cases, ambiguities, and exploit paths in plans, code, or designs. Use when reviewing proposals, auditing security, stress-testing logic, or validating assumptions.

DonTizi / codegeass-code-review exact

Automated code review with focus on security, performance, and maintainability. Use when reviewing code changes, PRs, or performing scheduled audits.

hezuogongying / llm-skills-manager-daily-ai-brief exact

每日 AI 内容源更新追踪与摘要。涵盖指定的 YouTube 播客、Twitter/X 博主及 Newsletter。适用于用户请求"RSS总结"、"日报"、"看看更新"时。

aj-geddes / useful-ai-prompts-security-headers-configuration exact

Configure HTTP security headers including CSP, HSTS, X-Frame-Options, and XSS protection. Use when hardening web applications against common attacks.

charlietlamb / ferix-convex-security-audit exact

Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations

charlietlamb / ferix-convex-security-check exact

Quick security audit checklist covering authentication, function exposure, argument validation, row-level access control, and environment variable handling

dirnbauer / webconsulting-skills-security-incident-reporting exact

Security Incident Report templates drawing from NIST/SANS. DDoS post-mortem, CVE correlation, timeline documentation, and blameless root cause analysis.

front-depiction / claude-setup-effect-ai-streaming exact

Master Effect AI streaming response patterns including start/delta/end protocol, accumulation strategies, resource-safe consumption, and history management with SubscriptionRef.

404kidwiz / claude-supercode-skills-ad-security-reviewer exact

Use when user needs Active Directory security analysis, privileged group design review, authentication policy assessment, or delegation and attack surface evaluation across enterprise domains.

ramidamolis-alt / agent-skills-workflows-ai-ml-expert exact

Expert in AI/ML with ALL MCP servers. Uses UltraThink for model analysis, Memory for experiment tracking, Context7 for ML docs, and NotebookLM for research papers.

front-depiction / claude-setup-effect-ai-prompt exact

Build prompts for Effect AI using messages, parts, and composition operators. Covers the complete Prompt API for constructing, merging, and manipulating conversations with language models.

gabriel-tecnologia / gab-claude-engineering-security-review exact

Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. It provides a comprehensive security...

proffesor-for-testing / agentic-qe-n8n-security-testing exact

Credential exposure detection, OAuth flow validation, API key management testing, and data sanitization verification for n8n workflows. Use when validating n8n workflow security.

aj-geddes / useful-ai-prompts-security-compliance-audit exact

Conduct comprehensive security compliance audits for SOC 2, GDPR, HIPAA, PCI-DSS, and ISO 27001. Use when preparing for certification, annual audits, or compliance validation.

mikeyobrien / ralph-orchestrator-code-assist exact

This sop guides the implementation of code tasks using test-driven development principles, following a structured Explore, Plan, Code, Commit workflow. It balances automation with user...

zebbern / claude-code-guide-pentest-commands exact

This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits", "crack passwords with hydra or john", "scan web vulnerabilities with nikto",...

zebbern / claude-code-guide-linux-privilege-escalation exact

This skill should be used when the user asks to "escalate privileges on Linux", "find privesc vectors on Linux systems", "exploit sudo misconfigurations", "abuse SUID binaries", "exploit cron jobs...