Audits Kubernetes security posture including RBAC permissions, network policies, pod security, and compliance. Use for security reviews, RBAC analysis, permission checks, network policy...
Scan for unprotected MCP servers using @contextware/mcp-scan package. Enables security auditing of local AI tools and network endpoints.
Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets, storage, network, authentication, cryptography, and platform-specific...
Guide for understanding and contributing to the awesome-game-security curated resource list. Use this skill when adding new resources, organizing categories, understanding project structure, or...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
When the user wants to plan, evaluate, or build a free tool for marketing purposes β lead generation, SEO value, or brand awareness. Also use when the user mentions "engineering as marketing,"...
Security patterns for MCP servers including OAuth 2.0, rate limiting, input validation, and audit loggingUse when "mcp security, mcp authentication, mcp oauth, mcp rate limit, secure mcp server,...
Domain reconnaissance coordinator that orchestrates subdomain discovery and port scanning to build comprehensive domain attack surface inventory
Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...
Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...
Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...
CVE vulnerability testing coordinator that identifies technology stacks, researches known vulnerabilities, and tests applications for exploitable CVEs using public exploits and proof-of-concept code.
Design tools that agents can use effectively, including when to reduce tool complexity. Use when creating, optimizing, or reducing agent tool sets.