Security
2492 skills in Testing & Security > Security
scan-vulnerabilities
Detect security vulnerabilities in code and dependencies. Use when auditing security.
security-react
Seguranca React. Use when reviewing security, implementing auth, or hardening code.
code-review-assistant
Comprehensive PR review that synthesizes security, performance, correctness, style, and documentation findings with actionable fixes.
sandbox-configurator
Secure sandbox policy design (filesystem, network, secrets, observability) with auditable guardrails for development runtimes.
security-react
Seguridad React. Use when reviewing security, implementing auth, or hardening code.
quality-security-scan
Scan code for security vulnerabilities and unsafe patterns. Use before committing sensitive code or in security reviews.
security-threat-model
Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs), preparing for security audits or compliance (PCI, HIPAA, SOC 2), investigating security incidents, integrating third-party services, or when user mentions "threat model", "security architecture", "STRIDE", "trust boundaries", "attack surface", or "security review".
security-react
Sécurité React. Use when reviewing security, implementing auth, or hardening code.
context-continuity-code
Claude Code-optimized context transfer for development workflows. Preserves code context, git state, running services, and development environment when moving work between sessions. Works seamlessly with peer review skills (Codex/Gemini). Use when transferring development work to a new Claude Code session.
creating-claude-hooks
Use when creating or publishing Claude Code hooks - covers executable format, event types, JSON I/O, exit codes, security requirements, and PRPM package structure
security-flutter
Flutter Security. Use when reviewing security, implementing auth, or hardening code.
security-reactnative
Segurança - Melhores Práticas React Native. Use when reviewing security, implementing auth, or hardening code.
flow-nexus-swarm
Orchestrate cloud-ready swarms on Flow Nexus with adaptive scaling, secure messaging, and validated deployment steps.
network-security-setup
Network isolation, allow/deny policy design, and TLS posture for sandboxes and CI with auditable enforcement.
council
Run multi-LLM council for adversarial debate and cross-validation. Orchestrates Claude, GPT-4, and Gemini for production-grade implementation, code review, architecture design, research, and security analysis.
security
自动检查常见安全漏洞和安全最佳实践
security-patterns
Comprehensive OWASP security guidelines, secure coding patterns, vulnerability prevention strategies, and remediation best practices for building secure applications
pinterest-api
Pinterest API v5 Development - Authentication, Pins, Boards, Analytics
security-flutter
Sécurité Flutter. Use when reviewing security, implementing auth, or hardening code.
github-oauth-nango-integration
Use when implementing GitHub OAuth + GitHub App authentication with Nango - provides two-connection pattern for user login and repo access with webhook handling