$ skills --list
AI 에이전트 스킬 둘러보기 및 발견
AI 에이전트 스킬 둘러보기 및 발견
Showing 2001-2020 of 44358 skills
Scan for input validation vulnerabilities and injection risks. Use when reviewing user input handling. Trigger with 'scan input validation', 'check injection vulnerabilities', or 'validate sanitization'.
Execute integration tests validating component interactions and system integration.Use when performing specialized testing.Trigger with phrases like "run integration tests", "test integration", or "validate component interactions".
Audit crypto wallet security including private key management and transaction signing.Use when auditing wallet security practices.Trigger with phrases like "audit wallet", "check security", or "verify signatures".
Validate WCAG compliance and accessibility standards (ARIA, keyboard navigation).Use when auditing WCAG compliance or screen reader compatibility.Trigger with phrases like "scan accessibility", "check WCAG compliance", or "validate screen readers".
Use when you need to work with cloud cost optimization.This skill provides cost analysis and optimization with comprehensive guidance and automation.Trigger with phrases like "optimize costs", "analyze spending",or "reduce costs".
Detect and analyze SQL injection vulnerabilities in application code and database queries.Use when you need to scan code for SQL injection risks, review query construction, validate input sanitization, or implement secure query patterns.Trigger with phrases like "detect SQL injection", "scan for SQLi vulnerabilities", "review database queries", or "check SQL security".
Automate SOC 2 audit preparation including evidence gathering, control assessment, and compliance gap identification.Use when you need to prepare for SOC 2 audits, assess Trust Service Criteria compliance, document security controls, or generate readiness reports.Trigger with phrases like "SOC 2 audit preparation", "SOC 2 readiness assessment", "collect SOC 2 evidence", or "Trust Service Criteria compliance".
Generate plots, charts, and graphs from data with automatic visualization type selection. Use when requesting "visualization", "plot", "chart", or "graph".
Use when you need to work with deployment and CI/CD.This skill provides deployment automation and pipeline orchestration with comprehensive guidance and automation.Trigger with phrases like "deploy application", "create pipeline",or "automate deployment".
Use when you need to track database changes for compliance and security monitoring.This skill implements audit logging using triggers, application-level logging, CDC, or native logs.Trigger with phrases like "implement database audit logging", "add audit trails","track database changes", or "monitor database activity for compliance".
Execute chaos engineering experiments to test system resilience.Use when performing specialized testing.Trigger with phrases like "run chaos tests", "test resilience", or "inject failures".
Detect potential memory leaks and analyze memory usage patterns in code. Use when troubleshooting performance issues related to memory growth or identifying leak sources. Trigger with phrases like "detect memory leaks", "analyze memory usage", or "find memory issues".
Check compliance with OWASP Top 10 security risks and best practices. Use when performing comprehensive security audits. Trigger with 'check OWASP compliance', 'audit web security', or 'validate OWASP'.
Use when you need to archive historical database records to reduce primary database size.This skill automates moving old data to archive tables or cold storage (S3, Azure Blob, GCS).Trigger with phrases like "archive old database records", "implement data retention policy","move historical data to cold storage", or "reduce database size with archival".
Setup machine learning experiment tracking using MLflow or Weights & Biases. Configures environment and provides code for logging parameters, metrics, and artifacts. Use when asked to "setup experiment tracking" or "initialize MLflow".
Execute proactive auto-loading: automatically detects and loads agents.md files. Use when appropriate context detected. Trigger with relevant phrases based on skill purpose.
Automate security vulnerability testing covering OWASP Top 10, SQL injection, XSS, CSRF, and authentication issues.Use when performing security assessments, penetration tests, or vulnerability scans.Trigger with phrases like "scan for vulnerabilities", "test security", or "run penetration test".
Validate CSRF protection implementations for security gaps. Use when reviewing form security or state-changing operations. Trigger with 'validate CSRF', 'check CSRF protection', or 'review token security'.
Validate CORS policies for security issues and misconfigurations. Use when reviewing cross-origin resource sharing. Trigger with 'validate CORS', 'check CORS policy', or 'review cross-origin'.
Monitor cross-chain bridge security, liquidity, and transaction status across networks.Use when monitoring cross-chain asset transfers.Trigger with phrases like "monitor bridges", "check cross-chain", or "track bridge transfers".