The ultimate authentication and authorization skill. Implement login, signin, signup, registration, OAuth, 2FA, MFA,...
Security
Security scanning, authentication, and vulnerability detection
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development...
Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE),...
Update the thinking dashboard after sessions. Scans sessions and updates stats.
Security audit workflow - vulnerability scan → verification
Search Robot Framework library/resource/suite documentation to find matching keywords for a use case. Use when asked...
Run local safety scans on Agent Skills before publishing. Detects secrets, dangerous code patterns, and analyzes...
Language and naming conventions advisor for worldbuilding. Creates consistent naming systems, develops linguistic...
NextDNS API integration best practices for authentication, profile management, analytics, logs, and real-time...
Use when storing credentials in OCI Vault, troubleshooting secret retrieval failures, implementing secret rotation,...
Master smart contract security with auditing, vulnerability detection, and incident response
Generate improvement reports for skills or CLI packages you authored. Use when ending a session where you worked on...
Reduce controller bloat using Form Requests for auth/validation, small Actions/Services with DTOs, and...
Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and...
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports",...
Build Slack apps using the Bolt framework across Python, JavaScript, and Java. Covers Block Kit for rich UIs,...
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
Translates boring corporate speak into authentic 17th-century pirate lingo.
Expert guidance for Nchan, a scalable pub/sub server for Nginx. Use this skill when you need to configure Nchan...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...
DevSecOps skill for security automation, vulnerability management, secure CI/CD pipelines, container security,...
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or...