5957 results (68.2ms) page 6 / 298
hardw00t / ai-security-arsenal-cloud-security exact

Multi-cloud security assessment skill for AWS, Azure, and GCP. This skill should be used when performing cloud security audits, scanning for misconfigurations, testing IAM policies, auditing...

199-biotechnologies / claude-deep-research-skill exact

Conduct enterprise-grade research with multi-source synthesis, citation tracking, and verification. Use when user needs comprehensive analysis requiring 10+ sources, verified claims, or comparison...

omer-metin / skills-for-antigravity-ai-code-security exact

Security vulnerabilities in AI-generated code and LLM applications, covering OWASP Top 10 for LLMs, secure coding patterns, and AI-specific threat modelsUse when "ai code security, llm...

ngxtm / devkit-ux-researcher-designer exact

UX research and design toolkit for Senior UX Designer/Researcher including data-driven persona generation, journey mapping, usability testing frameworks, and research synthesis. Use for user...

ovachiever / droid-tings-ux-researcher-designer exact

UX research and design toolkit for Senior UX Designer/Researcher including data-driven persona generation, journey mapping, usability testing frameworks, and research synthesis. Use for user...

ovachiever / droid-tings-research-lookup exact

Look up current research information using Perplexity's Sonar Pro or Sonar Reasoning Pro models through OpenRouter. Automatically selects the best model based on query complexity. Search academic...

gmh5225 / awesome-game-security-reverse-engineering-tools exact

Guide for reverse engineering tools and techniques used in game security research. Use this skill when working with debuggers, disassemblers, memory analysis tools, binary analysis, or decompilers...

rand / cc-polymath-discover-research exact

Gateway skill for research methodology - automatically loads relevant research skills based on task context

bgauryy / octocode-mcp-octocode-research exact

This skill should be used when the user asks to "research code", "how does X work", "where is Y defined", "who calls Z", "trace code flow", "find usages", "review a PR", "explore this library",...

omer-metin / skills-for-antigravity-llm-security-audit exact

Comprehensive security auditing framework for LLM applications covering OWASP Top 10 for LLMs, threat modeling, penetration testing, and compliance with NIST AI RMF and ISO 42001Use when "security...

TaylorHuston / local-life-manager-security-audit exact

Comprehensive security audit of codebase using multiple security-auditor agents. Use before production deployments or after major features.

404kidwiz / agent-skills-backup-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

rmyndharis / antigravity-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

halay08 / fullstack-agent-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

RichardoC / skills-lightweight-security-review exact

Conducts a comprehensive security review of a git repo. Use when asked about security issues, code quality concerns, or to evaluate the security posture of a codebase or library.

oguzhantopgul / skill-security-reviewer exact

Security review and threat analysis for agent skills. Use when reviewing, auditing, or validating skills for security issues including prompt injection, code execution risks, data exfiltration,...

shipshitdev / library-security-expert exact

Expert in application security, OWASP Top 10, authentication, authorization, data protection, and security best practices for React, Next.js, and NestJS applications

erichowens / some-claude-skills-research-analyst exact

Conducts thorough landscape research, competitive analysis, best practices evaluation, and evidence-based recommendations. Expert in market research and trend analysis.

dirnbauer / webconsulting-skills-security-audit exact

Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring.

TheDecipherist / claude-code-mastery-security-audit exact

Audit code and dependencies for security vulnerabilities. Use when reviewing PRs, checking dependencies, preparing for deployment, or when user mentions security, vulnerabilities, or audit.