5122 results (39.2ms) page 7 / 257
proffesor-for-testing / agentic-qe-stream-chain exact

Stream-JSON chaining for multi-agent pipelines, data transformation, and sequential workflows

sickn33 / antigravity-awesome-skills-api-security-best-practices exact

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

rmyndharis / antigravity-skills-dependency-management-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

halay08 / fullstack-agent-skills-dependency-management-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

404kidwiz / agent-skills-backup-dependency-management-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

ovachiever / droid-tings-information-security-manager-iso27001 exact

Senior Information Security Manager specializing in ISO 27001 and ISO 27002 implementation for HealthTech and MedTech companies. Provides ISMS implementation, cybersecurity risk assessment,...

rmyndharis / antigravity-skills-codebase-cleanup-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

404kidwiz / agent-skills-backup-codebase-cleanup-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

halay08 / fullstack-agent-skills-codebase-cleanup-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

sugarforever / 01coder-agent-skills-next-js-security-scan exact

Comprehensive security vulnerability scanner for Next.js and TypeScript/JavaScript projects. Detects OWASP Top 10 vulnerabilities, XSS, injection flaws, authentication issues, hardcoded secrets,...

mindrally / skills-security-best-practices exact

Security best practices for backend development, microservices, and secure coding patterns with emphasis on input validation and authentication

aj-geddes / useful-ai-prompts-cloud-security-configuration exact

Implement comprehensive cloud security across AWS, Azure, and GCP with IAM, encryption, network security, compliance, and threat detection.

aj-geddes / useful-ai-prompts-api-security-hardening exact

Secure REST APIs with authentication, rate limiting, CORS, input validation, and security middleware. Use when building or hardening API endpoints against common attacks.

aj-geddes / useful-ai-prompts-security-audit-logging exact

Implement comprehensive security audit logging for compliance, forensics, and SIEM integration. Use when building audit trails, compliance logging, or security monitoring systems.

mapbox / mapbox-agent-skills-mapbox-token-security exact

Security best practices for Mapbox access tokens, including scope management, URL restrictions, rotation strategies, and protecting sensitive data. Use when creating, managing, or advising on...

mapbox / mcp-devkit-server-mapbox-token-security exact

Security best practices for Mapbox access tokens, including scope management, URL restrictions, rotation strategies, and protecting sensitive data. Use when creating, managing, or advising on...

netsapiensis / claude-code-skills-rocky-security-hardening exact

Rocky Linux 8/9 security hardening including CIS benchmarks with OpenSCAP, SSH hardening, fail2ban, auditd rules, PAM configuration with authselect, and system-wide crypto policies. Use when...

majiayu000 / claude-arsenal-auth-security exact

OAuth 2.1 + JWT authentication security best practices. Use when implementing auth, API authorization, token management. Follows RFC 9700 (2025).