10392 results (99.2ms) page 35 / 520
ngxtm / devkit-sql-injection-testing exact

This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through...

shishiv / gsd-api-security-best-practices exact

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

ngxtm / devkit-api-security-best-practices exact

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

404kidwiz / agent-skills-backup-api-security-best-practices exact

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

halay08 / fullstack-agent-skills-api-security-best-practices exact

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

cleodin / antigravity-awesome-skills-api-security-best-practices exact

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

aj-geddes / useful-ai-prompts-network-security-groups exact

Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.

netresearch / enterprise-readiness-skill-enterprise-readiness exact

Assess and enhance software projects for enterprise-grade security, quality, and automation. This skill should be used when evaluating projects for production readiness, implementing supply chain...

sickn33 / antigravity-awesome-skills-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

aj-geddes / useful-ai-prompts-security-compliance-audit exact

Conduct comprehensive security compliance audits for SOC 2, GDPR, HIPAA, PCI-DSS, and ISO 27001. Use when preparing for certification, annual audits, or compliance validation.

regenrek / agent-skills-security-leak-guardrails exact

Sets up secret-leak prevention guardrails with forbidden path checks, gitleaks config, CI secret scanning, and dependency updates. Use when hardening repos against credential leaks or when adding...

martinholovsky / claude-skills-generator-ci-cd-pipeline-security-expert exact

Expert in CI/CD pipeline design with focus on secret management, code signing, artifact security, and supply chain protection for desktop application builds