Security
2492 skills in Testing & Security > Security
aws-cost-operations
This skill provides AWS cost optimization, monitoring, and operational best practices with integrated MCP servers for billing analysis, cost estimation, observability, and security assessment.
asking-codex
Code review, security audits, bug detection, alternative implementations, second opinions via OpenAI Codex. Use when user asks for code review, security analysis, implementation advice, bug detection, code patterns, or wants a second opinion on code. Supports uncommitted changes review. Do not use for architecture design or web searches.
security-flutter
Seguridad Flutter. Use when reviewing security, implementing auth, or hardening code.
gate-validation
Validate that quality, security, and release gates are correctly defined, implemented, and enforced with evidence.
security-react
React Security. Use when reviewing security, implementing auth, or hardening code.
aws-specialist
Deliver AWS-first architectures with secure, cost-aware operations
hooks-automation
Manage event hooks and connectors with secure routing and backoff
security-reactnative
Seguridad - Mejores Prácticas de React Native. Use when reviewing security, implementing auth, or hardening code.
secrets-scanner
Scan codebase for secrets, API keys, credentials, and PII. Detect hardcoded sensitive data. Use when auditing for secrets, checking for exposed keys, reviewing security, or scanning for PII.
security
Central hub for secure design, vulnerability assessment, and remediation routing across the security skill group.
dependencies
Map, assess, and remediate project dependencies with routing to dependency-mapper and security checks.
holistic-evaluation
Deliver a 360° evaluation of a codebase or feature, blending architecture, correctness, performance, security, and UX signals.
reverse-engineering-firmware
Firmware-focused reverse engineering for embedded/IoT images with extraction, partition analysis, and secure handling.
notebooklm
Query Google NotebookLM for source-grounded, citation-backed answers from uploaded documents. Reduces hallucinations through Gemini's document-only responses. Browser automation with library management and persistent authentication.
security-symfony
Sicherheit & DSGVO - Atoll Tourisme. Use when reviewing security, implementing auth, or hardening code.
planning
Technical implementation planning and architecture design. Capabilities: feature planning, system architecture, technical evaluation, implementation roadmaps, requirement breakdown, trade-off analysis, codebase analysis, solution design. Actions: plan, architect, design, evaluate, breakdown technical solutions. Keywords: implementation plan, technical design, architecture, system design, roadmap, requirements analysis, trade-offs, technical evaluation, feature planning, solution design, scalability, security, maintainability, sprint planning, task breakdown. Use when: planning new features, designing system architecture, evaluating technical approaches, creating implementation roadmaps, breaking down complex requirements, assessing technical trade-offs.
consultant
Consults external AI models (100+ via LiteLLM) for complex analysis. Use for architectural review, security audit, deep code understanding, or when extended reasoning is needed. Runs async with session management.
solana-security
Audit Solana programs (Anchor or native Rust) for security vulnerabilities. Use when reviewing smart contract security, finding exploits, analyzing attack vectors, performing security assessments, or when explicitly asked to audit, review security, check for bugs, or find vulnerabilities in Solana programs.
kubernetes-best-practices
Provides production-ready Kubernetes manifest guidance including resource management, security, high availability, and configuration best practices. This skill should be used when working with Kubernetes YAML files, deployments, pods, services, or when users mention k8s, container orchestration, or cloud-native applications.
security-fixer
Use when generating security patches, fixing vulnerabilities, or creating code remediation for security findings. Invoked for automated fix generation, patch creation, and vulnerability remediation.