🔒

Security

2492 skills in Testing & Security > Security

Production SSH Access

Provides guidance and utilities for securely accessing the Codante Frontend production server via SSH. Use this when you need to connect to the production server, run commands, check logs, manage pm2 processes, troubleshoot issues, or verify deployments.

codante-io/codante-io-front
12
8
Actualizado 5d ago

security-audit

Security vulnerability analysis to detect hardcoded secrets, dangerous patterns, and unsafe code practices.

huseyindeniz/vite-react-dapp-template
12
7
Actualizado 5d ago

vulnerability-resolver

Specialized CVE and vulnerability management for morphir-dotnet. Use when user asks to scan for vulnerabilities, fix CVEs, suppress false positives, review security reports, or manage dependency-check. Triggers include "CVE", "vulnerability", "security scan", "dependency-check", "suppress", "false positive", "CVSS", "security fix".

finos/morphir-dotnet
12
10
Actualizado 5d ago

cybersecurity-analyst

Analyzes events through cybersecurity lens using threat modeling, attack surface analysis, defense-in-depth, zero-trust architecture, and risk-based frameworks (CIA triad, STRIDE, MITRE ATT&CK). Provides insights on vulnerabilities, attack vectors, defense strategies, incident response, and security posture. Use when: Security incidents, vulnerability assessments, threat analysis, security architecture, compliance. Evaluates: Confidentiality, integrity, availability, threat actors, attack patterns, controls, residual risk.

rysweet/MicrosoftHackathon2025-AgenticCoding
12
3
Actualizado 5d ago

docker-optimization

Docker image optimization patterns including multi-stage builds, layer caching, security hardening, and size reduction techniques. Use when building Docker images, optimizing container size, improving build performance, or implementing Docker security best practices. Reduces image sizes by 70-90% and build times by 50-80%.

applied-artificial-intelligence/claude-code-toolkit
12
2
Actualizado 5d ago

computer-scientist-analyst

Analyzes events through computer science lens using computational complexity, algorithms, data structures, systems architecture, information theory, and software engineering principles to evaluate feasibility, scalability, security. Provides insights on algorithmic efficiency, system design, computational limits, data management, and technical trade-offs. Use when: Technology evaluation, system architecture, algorithm design, scalability analysis, security assessment. Evaluates: Computational complexity, algorithmic efficiency, system architecture, scalability, data integrity, security.

rysweet/MicrosoftHackathon2025-AgenticCoding
12
3
Actualizado 5d ago

Unnamed Skill

Marketplace

Use when building high-performance async Python APIs with FastAPI and Pydantic V2. Invoke for async SQLAlchemy, JWT authentication, WebSockets, OpenAPI documentation. Keywords: FastAPI, Pydantic, async, SQLAlchemy, JWT, OpenAPI.

Jeffallan/claude-skills
12
1
Actualizado 5d ago

Unnamed Skill

Marketplace

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. Keywords: security, authentication, authorization, OWASP, encryption, vulnerability.

Jeffallan/claude-skills
12
1
Actualizado 5d ago

Unnamed Skill

Marketplace

Use when building enterprise Java applications with Spring Boot 3.x, microservices, or reactive programming. Invoke for WebFlux, JPA optimization, Spring Security, cloud-native patterns. Keywords: Spring Boot, Java 21, WebFlux, Hibernate, microservices.

Jeffallan/claude-skills
12
1
Actualizado 5d ago

Unnamed Skill

Marketplace

Use when building Django web applications or REST APIs with Django REST Framework. Invoke for Django models, ORM optimization, DRF serializers, viewsets, authentication with JWT. Keywords: Django, DRF, ORM, serializer, viewset, model.

Jeffallan/claude-skills
12
1
Actualizado 5d ago

Unnamed Skill

Marketplace

Use when deploying or managing Kubernetes workloads requiring cluster configuration, security hardening, or troubleshooting. Invoke for Helm charts, RBAC policies, NetworkPolicies, storage configuration, performance optimization. Keywords: Kubernetes, K8s, kubectl, Helm, RBAC, NetworkPolicy.

Jeffallan/claude-skills
12
1
Actualizado 5d ago

nist-compliance

NIST 800-53r5 control implementation, tagging, evidence collection, and compliance automation for security frameworks

williamzujkowski/standards
11
0
Actualizado 5d ago

codex-code-review

Marketplace

Perform comprehensive code reviews using OpenAI Codex CLI. This skill should be used when users request code reviews, want to analyze diffs/PRs, need security audits, performance analysis, or want automated code quality feedback. Supports reviewing staged changes, specific files, entire directories, or git diffs.

tyrchen/claude-skills
11
1
Actualizado 5d ago

rls-patterns

Row Level Security patterns for database operations. Use when writing Prisma/database code, creating API routes that access data, or implementing webhooks. Enforces withUserContext, withAdminContext, or withSystemContext helpers. NEVER use direct prisma calls.

bybren-llc/wtfb-safe-agentic-workflow
11
4
Actualizado 5d ago

service-mesh

A service mesh is an infrastructure layer that provides transparent service-to-service communication with built-in observability, traffic management, and security features without requiring application code changes.

williamzujkowski/standards
11
0
Actualizado 5d ago

api-security

1. Broken Object Level Authorization (BOLA) - API fails to validate user access to objects 2. Broken Authentication - Weak or missing authentication mechanisms 3. Broken Object Property Level Authorization - Missing field-level access control 4. Unrestricted Resource Consumption - No rate limiting or throttling 5. Broken Function Level Authorization - Missing authorization checks on endpoints 6. Unrestricted Access to Sensitive Business Flows - Automated abuse of legitimate workflows 7. Server Side Request Forgery (SSRF) - API accepts URLs without validation 8. Security Misconfiguration - Insecure default configs, verbose errors 9. Improper Inventory Management - Undocumented/deprecated APIs in production 10. Unsafe Consumption of APIs - Trusting third-party API data without validation

williamzujkowski/standards
11
0
Actualizado 5d ago

security-operations

Security Operations Center (SOC) practices, incident response, SIEM management, and threat hunting following NIST 800-61

williamzujkowski/standards
11
0
Actualizado 5d ago

input-validation

Input-Validation standards for input validation in Security environments.

williamzujkowski/standards
11
0
Actualizado 5d ago

Unnamed Skill

Use for formal compliance audits requiring documentation (SOC2, PCI-DSS, HIPAA, GDPR, ISO 27001). Enforces TodoWrite with 20+ items. Triggers: "compliance audit", "regulatory assessment", "auditor documentation". NOT for casual PR checks. If thinking "ad-hoc review" - use this.

pvillega/claude-templates
11
4
Actualizado 5d ago

tidbx-setup

Set up the TiDB Cloud component (install ticloud CLI and authenticate). Use when the user needs to install ticloud, log in, or fix authentication/network access before running TiDB Cloud operations.

pingcap/agenticstore
11
4
Actualizado 5d ago