4300 results (44.1ms) page 4 / 215
sickn33 / antigravity-awesome-skills-security-review exact

Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist...

jamditis / claude-skills-journalism-security-checklist exact

Pre-deployment security audit for web applications. Use when reviewing code before shipping, auditing an existing application, or when users mention "security review," "ready to deploy," "going to...

mhylle / claude-skills-collection-security-review exact

Comprehensive security audit for code changes. Use this skill when implementing authentication, authorization, user input handling, API endpoints, secrets/credentials, payment features, or file...

RLGeeX / rlg-copilot-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

wshobson / agents-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

404kidwiz / agent-skills-backup-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

halay08 / fullstack-agent-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

rmyndharis / antigravity-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

hardw00t / ai-security-arsenal-cloud-security exact

Multi-cloud security assessment skill for AWS, Azure, and GCP. This skill should be used when performing cloud security audits, scanning for misconfigurations, testing IAM policies, auditing...

omer-metin / skills-for-antigravity-ai-code-security exact

Security vulnerabilities in AI-generated code and LLM applications, covering OWASP Top 10 for LLMs, secure coding patterns, and AI-specific threat modelsUse when "ai code security, llm...

lyndonkl / claude-security-threat-model exact

Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs),...

gmh5225 / awesome-game-security-awesome-game-security-overview exact

Guide for understanding and contributing to the awesome-game-security curated resource list. Use this skill when adding new resources, organizing categories, understanding project structure, or...

omer-metin / skills-for-antigravity-llm-security-audit exact

Comprehensive security auditing framework for LLM applications covering OWASP Top 10 for LLMs, threat modeling, penetration testing, and compliance with NIST AI RMF and ISO 42001Use when "security...

TaylorHuston / local-life-manager-security-audit exact

Comprehensive security audit of codebase using multiple security-auditor agents. Use before production deployments or after major features.

halay08 / fullstack-agent-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

404kidwiz / agent-skills-backup-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

rmyndharis / antigravity-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

RichardoC / skills-lightweight-security-review exact

Conducts a comprehensive security review of a git repo. Use when asked about security issues, code quality concerns, or to evaluate the security posture of a codebase or library.

oguzhantopgul / skill-security-reviewer exact

Security review and threat analysis for agent skills. Use when reviewing, auditing, or validating skills for security issues including prompt injection, code execution risks, data exfiltration,...