安全性
2492 skills in 測試與安全 > 安全性
hardened-deployment-workflow
Production-ready deployment workflow examples with OIDC authentication, environment protection, approval gates, and rollback patterns.
containerization
Build and deploy Docker containers for Node.js applications. Use when containerizing applications, optimizing Docker builds, or configuring container security.
spring-boot-reviewer
WHEN: Spring Boot code review, DI patterns, @Transactional, REST API design, security configuration WHAT: Dependency injection + Transaction management + API design + Security config + JPA patterns WHEN NOT: Kotlin Spring → kotlin-spring-reviewer, Pure Java → java-reviewer, Django/FastAPI → respective reviewers
security-patterns
Application security patterns and best practices. Use when implementing authentication, authorization, input validation, secrets management, OWASP protections, or security hardening.
research
Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable.
new-domain-setup
Complete domain hosting setup workflow combining Plesk, Cloudflare, Let's Encrypt, and GitHub Actions deployment. Use when setting up a new domain from scratch, including DNS configuration, SSL certificates, and automated deployment pipelines. Orchestrates plesk-domain-setup, cloudflare-domain-setup, and github-actions-deploy skills.
nestjs-authentication
Use this skill whenever the user wants to design, implement, or refactor authentication and authorization in a NestJS TypeScript backend, including JWT, sessions, refresh tokens, guards, roles/permissions, and integration with modules/services/controllers.
security-review
Security audit for vulnerabilities, compliance issues, and sensitive data exposure. Use before production deployments or when reviewing security-sensitive code.
arcanea-code-review
Conduct thorough, constructive code reviews that improve code quality and team knowledge. Focuses on what matters - architecture, logic, security, maintainability - while avoiding bikeshedding.
review-semgrep
Review and triage semgrep security scan results to identify true positive vulnerabilities. Use when analyzing semgrep output, triaging security findings, reviewing static analysis results, or when the user has semgrep-results directories to review. Performs deep code analysis to distinguish real vulnerabilities from false positives with high confidence.
repomix
Package entire code repositories into single AI-friendly files using Repomix. Capabilities include pack codebases with customizable include/exclude patterns, generate multiple output formats (XML, Markdown, plain text), preserve file structure and context, optimize for AI consumption with token counting, filter by file types and directories, add custom headers and summaries. Use when packaging codebases for AI analysis, creating repository snapshots for LLM context, analyzing third-party libraries, preparing for security audits, generating documentation context, or evaluating unfamiliar codebases.
security-checklist
Prevents RCE, SQL injection, and common vulnerabilities through validation and safe coding practices. Use when implementing or reviewing security-sensitive code involving user input, database queries, or command execution.
code-review
Review code for quality, security, and best practices. Use when reviewing recent changes, PRs, or checking code quality. Proactively use after significant code modifications.
supabase-realtime
Comprehensive guide for implementing Supabase Realtime features with best practices, scalable patterns, and migration strategies. Use when building realtime features in Supabase applications including messaging, notifications, presence, live updates, collaborative features, or migrating from postgres_changes to broadcast. Covers client setup, database triggers with realtime.broadcast_changes, RLS authorization, naming conventions, and performance optimization.
code-analyze
Run static analysis, security scans, and dependency checks on .NET code. Use when task involves code quality, security audits, or vulnerability detection.
security-lens
Apply security awareness during code review and implementation. Catches common vulnerabilities without requiring full security audit.
code-reviewer
Proactively review code quality and security. Use automatically after code changes, when PRs are created, and before commits. Must be used for security, performance, and best practices reviews.
openapi-spec-builder
Generate OpenAPI 3.x specification files (YAML) with endpoints, schemas, authentication, and examples for REST API documentation. Triggers on "create OpenAPI spec", "generate API documentation", "swagger spec for", "REST API schema".
managing-sops-secrets
Manages SOPS-encrypted Kubernetes secrets for Flux GitOps deployments using age encryption
api-generator
Generate complete CRUD API endpoints with async patterns, Pydantic validation, JWT authentication, and proper error handling. Activates when creating new API resources or routes.