Guidelines for building Python cybersecurity tools with secure coding practices, async scanning, and structured security testing.
Multi-agent research skill for parallel research execution (10 agents, battle-tested with real case studies).
Multi-agent research skill for parallel research execution (10 agents, battle-tested with real case studies).
Multi-agent research skill for parallel research execution (10 agents, battle-tested with real case studies).
Senior Security Engineer & Forensic Analyst. Expert in AI-driven vulnerability scanning, CTEM standards, and agentic security orchestration.
Deep domain research and expertise synthesis across industries, combining academic research, market intelligence, and practitioner knowledge
Create optimized Dockerfiles with multi-stage builds, security hardening, and vulnerability scanning for minimal, secure container images.
Design and validate REST and GraphQL APIs with OpenAPI/GraphQL schema generation, security hardening, and OWASP API Security compliance.
Clean up user interviews in Research/User interviews/, add frontmatter tags, standardize structure, and aggregate insights into the research dashboard.
Plan and document family history research systematically. Structures genealogical research with proper citations, evidence analysis, and organized family records.
Pre-PR compliance and security scan. Checks diff against CLAUDE.md guidelines and security best practices before creating a pull request.
Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Code review expert for security, quality, and performance analysis. Use when reviewing code, PRs, conducting security audits, or identifying performance issues.
Security audit skill for detecting dangerous APIs, footgun patterns, and vulnerability variants. Use when reviewing code for security issues or doing variant analysis.
The Foundation Skill. LLM Firewall + 2025 Security + Cross-Skill Coordination. Use for ALL code output - prevents hallucinations, enforces security, ensures quality.
ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices.
Search academic papers, find citations, and explore research using Semantic Scholar. Use when user asks about scientific papers, research, citations, or academic topics.