ClaudSkillsSecurity

Claude Security Skills

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,612 skills · updated 2026-05-02 · showing 1–60 of 2,612 by quality score

Guide for adult content payment processor selection, merchant account application, compliance, webhook integration, and fallback strategies (CCBill, SegPay, AllSecure, Epoch,…
Score 95/100
Unified APM and monitoring surface. Polls Datadog, New Relic, and OpenTelemetry backends for active alerts, error traces, and entity health.
Score 95/100
Ship parcels via any configured carrier — MyParcel, Sendcloud, DHL Parcel NL, PostNL, DPD, UPS, FedEx.
Score 95/100
Post-setup credential manager. Shows current integration status (configured/missing/expired) and lets you update individual credentials without re-running the full setup wizard.
Score 95/100
Researches malware analysis, CVEs, attribution reports, and hacker community sources. Use when the album subject involves cybersecurity incidents or threat actors.
Score 95/100
Completely remove claude-ops plugin, all stored credentials, cached files, shell exports, and MCP registrations. Confirms each step before deletion.
Score 95/100
Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations including Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference.
Score 85/100
Analyze feature requirements, dependencies, and security considerations. Use when starting feature implementation from GitHub issues to understand scope, technical feasibility,…
Score 85/100
Expert-level security auditing, compliance, code review, and vulnerability assessment
Score 85/100
Authentication and authorization including JWT, OAuth2, OIDC, sessions, RBAC, and security analysis. Activate for login, auth flows, security audits, threat modeling, access…
Score 85/100
AWS security configuration scanning and hardening using Prowler, Security Hub, and AWS Config
Score 85/100
Azure security configuration scanning and hardening using Azure Security Center, Azure Policy, and ScoutSuite
Score 85/100
Pedantic backend pre-commit and atomic commit Skill for Django/Optimo-style repos. Enforces local AGENTS.md / CLAUDE.md, pre-commit hooks, .security/* helpers, and Monty’s backend…
Score 85/100
Red vs Blue team security competition orchestrator. Runs long-running overnight battles with 1000s of interactions, scoring, and insight generation.
Score 85/100
Amazon Bedrock Automated Reasoning for mathematical verification of AI responses against formal policy rules with up to 99% accuracy.
Score 85/100
Amazon Bedrock Prompt Management for creating, versioning, and managing prompt templates with variables, multi-variant A/B testing, and flow integration.
Score 85/100
Expert-level blockchain, Web3, smart contracts, DeFi, and cryptocurrency development
Score 85/100
OrchestKit security wrapper for browser automation. Adds URL blocklisting, rate limiting, robots.txt enforcement, and ethical scraping guardrails on top of the upstream…
Score 85/100
Searches and explores Burp Suite project files (.burp) from the command line. Use when searching response headers or bodies with regex patterns, extracting security audit…
Score 85/100
Diagnoses and fixes HTTPS/SSL certificate issues in the network infrastructure by checking API tokens, validating Caddy configuration, and testing certificates.
Score 85/100
AI-powered analysis of cancer metabolic reprogramming including Warburg effect, glutamine addiction, lipid metabolism, and metabolic vulnerabilities for therapeutic targeting.
Score 85/100
AI-powered analysis of chromosomal instability (CIN) signatures for cancer prognosis, immunotherapy response prediction, and therapeutic vulnerability identification.
Score 85/100
Validate and analyze AWS CloudFormation templates for security and best practices
Score 85/100
Universal coding principles: DRY, security by default, null guards, and YAGNI. Trigger: When writing or reviewing code in any language or technology.
Score 85/100
Scans a codebase for security vulnerabilities using CodeQL's interprocedural data flow and taint tracking analysis.
Score 85/100
Expert-level CodeQL for static analysis, vulnerability detection, and security code scanning
Score 85/100
Automated evidence collection across compliance frameworks from cloud providers, identity systems, and security tools
Score 85/100
System bottleneck identification and exploitation skill with throughput analysis and five focusing steps implementation
Score 85/100
Container image and Kubernetes security scanning for CVEs, misconfigurations, and compliance
Score 85/100
Gets secure, one-time-use payment credentials (cards, tokens) from a Link wallet so agents can complete purchases on behalf of users.
Score 85/100
Cryptographic implementation analysis and validation for encryption algorithms, key sizes, and certificate management
Score 85/100
Medical device cybersecurity risk assessment skill per FDA premarket and postmarket guidance
Score 85/100
Validates permission inheritance between parent and child agents. Ensures child permissions are equal to or more restrictive than parent.
Score 85/100
Runtime enforcement of file system boundaries and tool access restrictions. Blocks unauthorized operations and logs violations.
Score 85/100
Evaluates whether a programming language dependency should be used by analyzing maintenance activity, security posture, community health, documentation quality, dependency…
Score 85/100
Performs security-focused differential review of code changes (PRs, commits, diffs). Adapts analysis depth to codebase size, uses git history for context, calculates blast radius,…
Score 85/100
TOS-compliant Discord notification monitor. Watches YOUR Discord server for security content forwarded by researchers, matches keywords, and pushes to paper-writer/dogpile via…
Score 85/100
Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by…
Score 85/100
Deploy payloads and shell commands fleet-wide using reliable tasking. Execute scripts, collect data, or run commands across all endpoints with automatic handling of offline…
Score 85/100
Systematically verifies suspected security bugs to eliminate false positives. Produces TRUE POSITIVE or FALSE POSITIVE verdicts with documented evidence for each bug.
Score 85/100
GCP security configuration scanning and hardening using Security Command Center, Forseti, and ScoutSuite
Score 85/100
Retroactively verify threat mitigations for a completed phase
Score 85/100
Containerized security auditing and ethical hacking tools. All operations run in isolated Docker containers for safety.
Score 85/100
HIPAA security and privacy compliance automation for ePHI protection, safeguards assessment, and audit preparation
Score 85/100
Infrastructure as Code security scanning and policy enforcement for Terraform, CloudFormation, Kubernetes, and Pulumi
Score 85/100
Creates repository following Clean Architecture with Protocol in domain layer and Implementation in infrastructure layer.
Score 85/100
Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production.
Score 85/100
Create investigations from security events, detections, or LCQL queries. Performs HOLISTIC investigations - not just process trees, but initial access hunting, org-wide scope…
Score 85/100
Expert-level Istio service mesh management, traffic control, security, and observability for Kubernetes
Score 85/100
Use when working with SQLite databases in Bun. Covers Bun's built-in SQLite driver, database operations, prepared statements, and transactions with high performance.
Score 85/100
Cryptographic key lifecycle management orchestration including generation, rotation, and destruction across key management systems
Score 85/100
Unified cloud security posture management across AWS, Azure, and GCP with normalized metrics and CIS benchmark comparison
Score 85/100
Enhance SEO (meta tags, semantic HTML) and security (vulnerability checks, hardening). Triggers: SEO, security, meta tags, vulnerability, 검색 최적화, 보안.
Score 85/100
Phishing simulation campaign execution and analysis for security awareness assessment
Score 85/100
Expert skill for protocol fuzzing, vulnerability discovery, and security testing
Score 85/100
User-invoked skill to run a comprehensive pre-ship review using all review agents relevant to the project's tech stack, with rad-code-review as the final gate.
Score 85/100
Packages and runs a local SAST pipeline scan to identify source code vulnerabilities.
Score 85/100
Audits Solidity codebases for smart contract vulnerabilities using a four-phase workflow (cheatsheet loading, codebase sweep, deep validation, reporting) covering 36 vulnerability…
Score 85/100
Developer security training and assessment for secure coding practices and vulnerability prevention
Score 85/100
Retroactively verify threat mitigations for a completed phase
Score 85/100
Search all 2,612 Security skills →