5957 results (52.9ms) page 9 / 298
lyndonkl / claude-domain-research-health-science exact

Use when formulating clinical research questions (PICOT framework), evaluating health evidence quality (study design hierarchy, bias assessment, GRADE), prioritizing patient-important outcomes,...

aj-geddes / useful-ai-prompts-user-research-analysis exact

Analyze user research data to uncover insights, identify patterns, and inform design decisions. Synthesize qualitative and quantitative research into actionable recommendations.

aj-geddes / useful-ai-prompts-api-security-hardening exact

Secure REST APIs with authentication, rate limiting, CORS, input validation, and security middleware. Use when building or hardening API endpoints against common attacks.

aj-geddes / useful-ai-prompts-security-audit-logging exact

Implement comprehensive security audit logging for compliance, forensics, and SIEM integration. Use when building audit trails, compliance logging, or security monitoring systems.

zubayer0077 / claude-multi-agent-research-system-skill-multi-agent-researcher exact

Conduct comprehensive research on any topic by coordinating 2-4 specialized researcher agents in parallel, then synthesizing findings into a detailed report via mandatory report-writer agent delegation

mapbox / mapbox-agent-skills-mapbox-token-security exact

Security best practices for Mapbox access tokens, including scope management, URL restrictions, rotation strategies, and protecting sensitive data. Use when creating, managing, or advising on...

mapbox / mcp-devkit-server-mapbox-token-security exact

Security best practices for Mapbox access tokens, including scope management, URL restrictions, rotation strategies, and protecting sensitive data. Use when creating, managing, or advising on...

netsapiensis / claude-code-skills-rocky-security-hardening exact

Rocky Linux 8/9 security hardening including CIS benchmarks with OpenSCAP, SSH hardening, fail2ban, auditd rules, PAM configuration with authselect, and system-wide crypto policies. Use when...

YuniorGlez / gemini-elite-core-security-audit-pro exact

Senior Data Security Architect & Forensic Auditor for 2026. Specialized in Row Level Security (RLS) enforcement, Zero-Trust database architecture, and automated data access auditing. Expert in...

jamesgray007 / hoai-course-researching-ai-news exact

Research and compile the latest AI news from across the industry. Use this skill when asked to find AI news, get AI updates, research what's happening in AI, check for AI announcements, or gather...

Yeachan-Heo / oh-my-claudecode-security-review exact

Run a comprehensive security review on code

gmh5225 / awesome-game-security-dma-attack-techniques exact

Guide for Direct Memory Access (DMA) attack techniques using FPGA hardware. Use this skill when researching PCIe DMA attacks, pcileech, FPGA firmware development, or hardware-based memory access...