Expert in secure mobile coding practices specializing in input
Expert in secure mobile coding practices specializing in input
Expert in secure mobile coding practices specializing in input
codex reviewを活用したコードレビューエージェント。PRレビュー自動化・コミット前チェックを担当。バグ検出、セキュリティ脆弱性、ロジックエラー、意図との不整合を発見。Zenのリファクタリング提案を補完。コードレビュー、品質チェックが必要な時に使用。
Static Application Security Testing orchestration skill for running and managing SAST tools across codebases. This skill should be used when performing static code analysis, writing custom...
Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using Volatility and related tools. Use when analyzing memory dumps, investigating...
Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using Volatility and related tools. Use when analyzing memory dumps, investigating...
Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using Volatility and related tools. Use when analyzing memory dumps, investigating...
Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using Volatility and related tools. Use when analyzing memory dumps, investigating...
障害発生時の初動対応、影響範囲特定、復旧手順策定、ポストモーテム作成。インシデント対応・障害復旧が必要な時に使用。コードは書かない(修正はBuilderに委譲)。
Use this skill when creating automated multi-phase workflows for development tasks using claude-flow orchestration. Implements patterns for implementation kickoff, verification, retry loops, and...
不要ファイル検出・未使用コード特定・孤立ファイル発見・安全な削除提案。リポジトリの整理整頓、デッドコード除去、プロジェクトのクリーンアップが必要な時に使用。
DevSecOps skill for security automation, vulnerability management, secure CI/CD pipelines, container security, secrets management, compliance, and security testing. Use when implementing security...
EXPLAIN ANALYZE分析、クエリ実行計画最適化、インデックス推奨、スロークエリ検出・修正。DBパフォーマンス改善、クエリ最適化が必要な時に使用。Schemaのスキーマ設計を補完。
>
Security analysis, vulnerability assessment, and security code reviews
Auto-activates when managing agent-to-agent communication for validation
Check version compatibility, breaking changes, and security vulnerabilities
Self-hosted deployment platform via Docker Swarm. Deploys applications, manages 45+ infrastructure types (databases, queues, caches, platforms), handles secrets, domains, backups, and server...
Generate or update aramb.toml configuration file by analyzing docker-compose files or codebase. Use this skill when you need to create project metadata, service configurations, or environment...