This skill should be used when the user asks to "test for insecure direct object references," "find IDOR vulnerabilities," "exploit broken access control," "enumerate user IDs or object...
This skill should be used when the user asks to "test for insecure direct object references," "find IDOR vulnerabilities," "exploit broken access control," "enumerate user IDs or object...
This skill should be used when the user asks to "test for insecure direct object references," "find IDOR vulnerabilities," "exploit broken access control," "enumerate user IDs or object...
This skill should be used when the user asks to "test for insecure direct object references," "find IDOR vulnerabilities," "exploit broken access control," "enumerate user IDs or object...
Research and compile the latest AI news from across the industry. Use this skill when asked to find AI news, get AI updates, research what's happening in AI, check for AI announcements, or gather...
Assess identified vulnerabilities for exploitability, impact, and risk.
Synthesize insights from multiple research sources into cohesive analysis
External research workflow for docs, web, APIs - NOT codebase exploration
External research workflow for docs, web, APIs - NOT codebase exploration
Research and strategize hashtag usage for maximum social media reach and discovery
Research agent for external documentation, best practices, and library APIs via MCP tools
Research agent for external documentation, best practices, and library APIs via MCP tools
Enables Claude to create, link, and query notes in Roam Research via Playwright MCP
Conduct qualitative user research, synthesize insights, and inform product decisions through interviews, usability testing, and behavioral analysis
Research topics and produce comprehensive written documentation. Synthesizes information into clear, well-structured, authoritative content pieces.
Expert in understanding user behaviors, needs, and motivations through qualitative and quantitative research methods to drive user-centered design.
Deep research expert for comprehensive technical investigations. Use when conducting technology evaluations, comparing solutions, analyzing papers, or exploring technical trends.
Use when conducting web research with Perplexity API - covers authentication, search strategies, structured output generation, and integration patterns for Claude-interpretable results
Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.