ClaudSkillsSecurity › Page 10

Claude Security Skills (Page 10 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,612 skills · updated 2026-05-02 · showing 541–600 of 2,612 by quality score

Target-agnostic bug bounty hunting methodology with parallel recon, systematic testing workflows, and vulnerability-specific exploitation guidance
Score 70/100
Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library
Score 70/100
Builds an automated malware submission and analysis pipeline that collects suspicious files from endpoints and
Score 70/100
Build effective detection rules using Splunk Search Processing Language (SPL) correlation searches to identify
Score 70/100
Builds vendor-agnostic detection rules using the Sigma rule format for threat detection across SIEM platforms
Score 70/100
Design and implement a comprehensive DevSecOps pipeline in GitLab CI/CD integrating SAST, DAST, container scanning,
Score 70/100
Builds real-time incident response dashboards in Splunk, Elastic, or Grafana to provide SOC analysts and leadership
Score 70/100
OpenCTI is an open-source platform for managing cyber threat intelligence knowledge, built on STIX 2.1 as its
Score 70/100
Build structured communication templates for malware incidents including stakeholder notifications, executive
Score 70/100
Establish a structured operational process to triage, test, and deploy Microsoft Patch Tuesday security updates
Score 70/100
Implement a phishing report button in email clients with automated triage workflow that analyzes user-reported
Score 70/100
Builds a structured ransomware incident response playbook aligned with the CISA StopRansomware Guide and NIST
Score 70/100
Deploy and configure the Havoc C2 framework with teamserver, HTTPS listeners, redirectors, and Demon agents for
Score 70/100
Build a structured SOC escalation matrix defining severity tiers, response SLAs, escalation paths, and notification
Score 70/100
Builds SOC performance metrics and KPI tracking dashboards measuring Mean Time to Detect (MTTD), Mean Time to
Score 70/100
Builds a structured SOC incident response playbook for ransomware attacks covering detection, containment, eradication,
Score 70/100
Expert for building user stories using Test-Driven Development (TDD) with NestJS and @lenne.tech/nest-server.
Score 70/100
Build comprehensive threat actor profiles using open-source intelligence (OSINT) techniques to document adversary
Score 70/100
Deploy MISP (Malware Information Sharing Platform) to aggregate, correlate, and distribute threat intelligence
Score 70/100
Build a systematic threat hunt hypothesis framework that transforms threat intelligence, attack patterns, and
Score 70/100
Build automated threat intelligence enrichment pipelines in Splunk Enterprise Security using lookup tables, modular
Score 70/100
Builds automated threat intelligence feed integration pipelines connecting STIX/TAXII feeds, open-source threat
Score 70/100
Building a Threat Intelligence Platform (TIP) involves deploying and integrating multiple CTI tools into a unified
Score 70/100
Implement a vulnerability aging dashboard and SLA tracking system to measure remediation performance against
Score 70/100
Deploy DefectDojo as a centralized vulnerability management dashboard with scanner integrations, deduplication,
Score 70/100
Build a vulnerability exception and risk acceptance tracking system with approval workflows, compensating controls
Score 70/100
Builds a structured vulnerability scanning workflow using tools like Nessus, Qualys, and OpenVAS to discover,
Score 70/100
Use when implementing Kubernetes security patterns including RBAC, NetworkPolicies, Pod Security Standards, secrets management, image scanning with Trivy, Cosign signing, and Dapr…
Score 70/100
Use when designing or hardening external-to-Salesforce integrations that orchestrate Bulk API 2.0 ingest or query jobs: OAuth-backed job lifecycle, mandatory UploadComplete,…
Score 70/100
Use when integrating Drizzle ORM with Bun's SQLite driver for type-safe schema definitions and migrations.
Score 70/100
Comprehensive Bun runtime expertise covering all major features. Use when working with Bun projects, migrating from Node.js, or leveraging Bun-specific APIs.
Score 70/100
Use for bun:sqlite, SQLite operations, prepared statements, transactions, and queries.
Score 70/100
Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay,…
Score 70/100
Caddy is a fast, extensible web server written in Go that provides automatic HTTPS via Let's Encrypt and ZeroSSL.
Score 70/100
Scans Cairo/StarkNet smart contracts for 6 critical vulnerabilities including felt252 arithmetic overflow, L1-L2 messaging issues, address conversion problems, and signature…
Score 70/100
Calculate cryptocurrency tax obligations with cost basis tracking, capital gains computation, and Form 8949 generation.
Score 70/100
Use when designing or troubleshooting Apex callouts that approach governor limits: choosing between synchronous callouts, @future, Queueable, Continuation, or async chaining…
Score 70/100
Use when building, reviewing, or debugging outbound Apex HTTP callouts, Named Credentials, request/response handling, timeout behavior, or mock-based tests.
Score 70/100
Capture frames or clips from RTSP/ONVIF cameras. Grabs snapshots, video clips, and motion events from IP cameras, security cameras, and video streams.
Score 70/100
Standards compliance assessment and gap analysis agent. Evaluates codebases against OWASP/WCAG/OpenAPI/ISO 25010 and other standards, detects violations, and provides actionable…
Score 70/100
Set up Canva Connect API OAuth 2.0 PKCE authentication and project scaffolding. Use when creating a new Canva integration, setting up OAuth credentials, or initializing a Canva…
Score 70/100
Configure Canva Connect API across development, staging, and production environments. Use when setting up multi-environment deployments, managing OAuth credentials per…
Score 70/100
Apply Canva Connect API security best practices for OAuth tokens and access control. Use when securing OAuth credentials, implementing least-privilege scopes, or auditing Canva…
Score 70/100
Develops Canvas code execution features with Pyodide/iframe sandboxing. Use when working on Python/JS execution, package management, or sandbox security.
Score 70/100
Watch live Linux and container activity through eBPF so you can triage suspicious runtime behavior before it disappears into guesswork.
Score 70/100
Cariddi is a Go-based security tool that takes a list of domains, crawls their URLs, and scans for endpoints, secrets, API keys, file extensions, tokens, and errors.
Score 70/100
Secure CAST AI API keys, RBAC configuration, and Kvisor security agent. Use when hardening CAST AI cluster access, configuring security scanning, or implementing API key rotation…
Score 70/100
Comprehensive Claude Code conversation analysis skill for deep-diving into CC session logs. Use when analyzing exported Claude Code conversations to understand: project patterns,…
Score 70/100
Audit and fix data organization: variable declarations, data types, magic numbers, naming conventions, and global data.
Score 70/100
Automatically discover cryptography skills when working with encryption, TLS, certificates, PKI, and security
Score 70/100
Automatically discover security skills when working with authentication, authorization, input validation, security headers, vulnerability assessment, or secrets management.
Score 70/100
CSA CCM expert for cloud security. Deep knowledge of Cloud Security Alliance Cloud Controls Matrix including 197 controls, 17 domains, CAIQ questionnaire, cloud service models…
Score 70/100
Auto-activate CCS CLI delegation for deterministic tasks. Parses user input, auto-selects optimal profile (glm/kimi/custom) from ~/.ccs/config.json, enhances prompts with context,…
Score 70/100
CCXT cryptocurrency trading library. Use for cryptocurrency exchange APIs, trading, market data, order management, and crypto trading automation across 150+ exchanges.
Score 70/100
CCXT cryptocurrency exchange library for Go developers. Covers both REST API (standard) and WebSocket API (real-time).
Score 70/100
CCXT cryptocurrency exchange library for PHP developers. Covers both REST API (standard) and WebSocket API (real-time).
Score 70/100
Expert Celery distributed task queue engineer specializing in async task processing, workflow orchestration, broker configuration (Redis/RabbitMQ), Celery Beat scheduling, and…
Score 70/100
Monitors internet-facing assets using Censys Search API v2 for host discovery and certificate enumeration.
Score 70/100
CEO Standards — Security policy, coding standards, performance patterns. Load this when reviewing security, writing code, or enforcing quality gates.
Score 70/100
Process Dependabot, Renovate, security, and manual dependency update work through GitHub with Ceratops defaults, using scripted live repo and PR checks before merge decisions.
Score 70/100
Search all 2,612 Security skills →