5957 results (55.0ms) page 5 / 298
rmyndharis / antigravity-skills-solidity-security exact

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or...

omer-metin / skills-for-antigravity-research-ai-tools exact

Master the AI tools that accelerate research and information gathering. From market research to academic analysis, find insights faster and make better decisions. Use when "research, find...

wrsmith108 / claude-skill-security-auditor exact

Claude Code skill for running structured security audits with actionable remediation plans

luiscamaral / k8s-cell-platform-skills-security-audit exact

Audits Kubernetes security posture including RBAC permissions, network policies, pod security, and compliance. Use for security reviews, RBAC analysis, permission checks, network policy...

sickn33 / antigravity-awesome-skills-security-review exact

Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist...

gmh5225 / awesome-game-security-awesome-game-security-overview exact

Guide for understanding and contributing to the awesome-game-security curated resource list. Use this skill when adding new resources, organizing categories, understanding project structure, or...

sickn33 / antigravity-awesome-skills-research-engineer exact

An uncompromising Academic Research Engineer. Operates with absolute scientific rigor, objective criticism, and zero flair. Focuses on theoretical correctness, formal verification, and optimal...

transilienceai / communitytools-ai-threat-testing exact

Offensive AI security testing and exploitation framework. Systematically tests LLM applications for OWASP Top 10 vulnerabilities including prompt injection, model extraction, data poisoning, and...

sanjay3290 / ai-skills-deep-research exact

Execute autonomous multi-step research using Google Gemini Deep Research Agent. Use for: market analysis, competitive landscaping, literature reviews, technical research, due diligence. Takes 2-10...

jamditis / claude-skills-journalism-security-checklist exact

Pre-deployment security audit for web applications. Use when reviewing code before shipping, auditing an existing application, or when users mention "security review," "ready to deploy," "going to...

mhylle / claude-skills-collection-security-review exact

Comprehensive security audit for code changes. Use this skill when implementing authentication, authorization, user input handling, API endpoints, secrets/credentials, payment features, or file...

mikeng-io / agent-skills-deep-research exact

Generic multi-domain research framework with domain-aware scheduling. Model-agnostic and domain-agnostic - perform comprehensive research on any topic.

wshobson / agents-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

RLGeeX / rlg-copilot-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

antoniolg / agent-kit-grok-research exact

Investigate a topic with Grok 4.1 via OpenRouter and generate a Markdown report with a timeline, verifiable claims, and sources (web/X). Use it when the user says “investiga…”, “haz research…”,...

halay08 / fullstack-agent-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

404kidwiz / agent-skills-backup-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

rmyndharis / antigravity-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

kongyo2 / deep-research-skill-deep-research exact

This skill should be used when the user requests comprehensive research, deep investigation, or detailed academic-style reports on any topic. Trigger phrases include "deep research",...