This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...
Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing. Includes security assessment tools, threat modeling, crypto...
Search Tool Hierarchy
Search Tool Hierarchy
Generates new Ralph hat collection presets through guided conversation. Asks clarifying questions, validates against schema constraints, and outputs production-ready YAML files.
This sop generates structured code task files from rough descriptions, ideas, or PDD implementation plans. It automatically detects the input type and creates properly formatted code task files...
Ethical hacking and security testing methodologies using penetration testing tools, exploit frameworks, and manual security validation. Use when assessing application security posture and...
Comprehensive API security testing skill for REST, GraphQL, gRPC, and WebSocket APIs. This skill should be used when performing API penetration testing, testing for OWASP API Top 10...
Use when the user wants to find NEW external skills for a project, build a skill stack from external registries, or compare external options against project needs. Do not use for questions about...
Lite database schema migration tool by Go
Choose the right search tool for each query type
Choose the right search tool for each query type
Developer Experience specialist. Improves tooling, setup, and
Developer Experience specialist. Improves tooling, setup, and
Developer Experience specialist. Improves tooling, setup, and
Developer Experience specialist. Improves tooling, setup, and
Debugging tools - console, debugger, network, profiling.
Integrate AI tools and APIs into business workflows and applications
Guide to the math cognitive stack - what tools exist and when to use each
Guide to the math cognitive stack - what tools exist and when to use each