5957 results (47.4ms) page 4 / 298
K-Dense-AI / claude-scientific-skills-market-research-reports exact

Generate comprehensive market research reports (50+ pages) in the style of top consulting firms (McKinsey, BCG, Gartner). Features professional LaTeX formatting, extensive visual generation with...

Cap-go / capacitor-skills-capacitor-security exact

Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets, storage, network, authentication, cryptography, and platform-specific...

cosmix / loom-security-scan exact

Quick routine security checks for secrets, dependencies, container images, and common vulnerabilities. Run frequently during development. Triggers: security scan, SAST, DAST, vulnerability scan,...

erichowens / some-claude-skills-security-auditor exact

Security vulnerability scanner and OWASP compliance auditor for codebases. Dependency scanning (npm audit, pip-audit), secret detection (high-entropy strings, API keys), SAST for injection/XSS...

proffesor-for-testing / agentic-qe-security-testing exact

Test for security vulnerabilities using OWASP principles. Use when conducting security audits, testing auth, or implementing security practices.

omer-metin / skills-for-antigravity-mcp-security exact

Security patterns for MCP servers including OAuth 2.0, rate limiting, input validation, and audit loggingUse when "mcp security, mcp authentication, mcp oauth, mcp rate limit, secure mcp server,...

linxule / interpretive-orchestration-project-setup exact

This skill should be used when users want to initialize a new qualitative research project, mentions 'setup', 'initialize', 'new project', 'getting started', or asks about establishing...

YuniorGlez / gemini-elite-core-secure-ai exact

Senior AI Security Architect. Expert in Prompt Injection Defense, Zero-Trust Agentic Security, and Secure Server Actions for 2026.

Charon-Fan / agent-playbook-security-auditor exact

Security vulnerability expert covering OWASP Top 10 and common security issues. Use when conducting security audits or reviewing code for vulnerabilities.

liangdabiao / social-research-agent-research-subagent exact

Internal skill - Research subagent that executes focused research tasks using web tools. Called automatically by the deep-research lead agent.

404kidwiz / claude-supercode-skills-powershell-security-hardening exact

Expert in Windows security hardening and PowerShell security configuration. Specializes in securing automation, enforcing least privilege, and aligning with enterprise security baselines. Use for...

sgcarstrends / sgcarstrends-security exact

Security auditing for code vulnerabilities (OWASP Top 10, XSS, SQL injection) and dependency scanning (pnpm audit, Snyk). Use when handling user input, adding authentication, before deployments,...

ngxtm / devkit-security-reviewer exact

Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.

Jeffallan / claude-skills-security-reviewer exact

Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.

hardw00t / ai-security-arsenal-iac-security exact

Infrastructure as Code security scanning skill for Terraform, CloudFormation, Kubernetes manifests, Helm charts, and ARM templates. This skill should be used when auditing IaC configurations for...

0xDarkMatter / claude-mods-security-patterns exact

Security patterns and OWASP guidelines. Triggers on: security review, OWASP, XSS, SQL injection, CSRF, authentication, authorization, secrets management, input validation, secure coding.

DauQuangThanh / hanoi-rainbow-code-security-review exact

Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE), authentication/authorization flaws, injection attacks, cryptography issues, sensitive data...

lyndonkl / claude-security-threat-model exact

Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs),...

404kidwiz / agent-skills-backup-solidity-security exact

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or...

halay08 / fullstack-agent-skills-solidity-security exact

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or...