Certificate Lifecycle Manager - Auto-activating skill for Security Advanced. Triggers on: certificate lifecycle manager, certificate lifecycle manager Part of the Security…
Score 70/100
Data persistence for CFN Loop - SQLite storage, Redis coordination, automatic memory persistence
Score 70/100
Secure SQL query execution with parameterized queries to prevent SQL injection attacks. Use when executing database queries, inserting/updating records, or performing any SQL…
Score 70/100
Agent interaction capture, logging, and analysis with memory tracking and security (Rust implementation).
Score 70/100
On-chain analysis and transaction forensics for blockchain security investigations. Provides capabilities for tracing fund flows, identifying suspicious patterns, MEV analysis,…
Score 70/100
트리거: "changelog", "변경 이력", "릴리즈 노트", "release notes", "CHANGELOG 만들어줘" git log 또는 PR/커밋 목록을 분석하여 Keep a Changelog 형식의 CHANGELOG.md를 생성한다.
Score 70/100
Quick reference cheatsheets for Kailash SDK patterns, nodes, workflows, and best practices. Use when asking about 'quick tips', 'cheat sheet', 'quick reference', 'common…
Score 70/100
Scans codebase for accidentally committed secrets, credentials, API keys, and sensitive data to prevent security breaches
Score 70/100
Scan the codebase for potential secret leaks including API keys, tokens, passwords, hardcoded project IDs, and sensitive identifiers.
Score 70/100
Audit Stripe integration: configuration, webhooks, subscription logic, security. Outputs structured findings. Use log-stripe-issues to create issues.
Score 70/100
Fetches dependency vulnerabilities from Vanta, Snyk, Dependabot, or GitHub Security Advisories, creates a tracking issue in Jira/Linear/GitHub Issues, then fixes, commits, pushes,…
Score 70/100
Check HIPAA compliance for healthcare data security requirements. Use when auditing healthcare applications.
Score 70/100
Check compliance with OWASP Top 10 security risks and best practices. Use when performing comprehensive security audits.
Score 70/100
Analyze session management implementations to identify security vulnerabilities in web applications. Use when you need to audit session handling, check for session fixation risks,…
Score 70/100
chezmoi manages dotfiles across multiple machines securely using a Git-backed source-of-truth model with templates, encryption, and cross-platform support.
Score 70/100
Static analysis of UEFI/BIOS firmware dumps using Intel's chipsec framework. Decode firmware structure, detect known malware and rootkits (LoJax, ThinkPwn, HackingTeam,…
Score 70/100
Records workflows in authenticated browser sessions and generates annotated GIF tutorials without handling credentials.
Score 70/100
Expert guidelines for Chrome extension development with Manifest V3, covering security, performance, and best practices
Score 70/100
Expert in Cilium eBPF-based networking and security for Kubernetes. Use for CNI setup, network policies (L3/L4/L7), service mesh, Hubble observability, zero-trust security, and…
Score 70/100
OpenStack Cinder block storage service. Provides persistent volume management for cloud instances including volume creation, snapshots, backups, LVM/iSCSI backend, volume types…
Score 70/100
Automatic decryption and decoding tool using AI. Use when user says "解密", "decrypt", "decode", "crack", "破解密码", or provides encrypted/encoded text that needs to be deciphered.
Score 70/100
Zero-knowledge proof circuit development using circom. Use when implementing arithmetic circuits for zkSNARKs, including circuit design, constraint verification, witness…
Score 70/100
CIS Controls v8 expert for baseline security. Deep knowledge of 18 controls, 153 safeguards, Implementation Groups (IG1/IG2/IG3), and practical implementation guidance for…
Score 70/100
Security leadership for growth-stage companies. Risk quantification in dollars, compliance roadmap (SOC 2/ISO 27001/HIPAA/GDPR), security architecture strategy, incident response…
Score 70/100
Expert CISO coaching and mentorship for security leaders in training. Use when the user asks for CISO coach guidance, executive communication advice, security leadership…
Score 70/100
Comprehensive Citrix domain knowledge covering CVAD, DaaS, Gateway, NetScaler, and Workspace products.
Score 70/100
Production readiness checklist for Claude-powered applications — Use when working with prod-checklist patterns. error handling, monitoring, fallbacks, cost controls, and security.
Score 70/100
Secure your Anthropic integration — API key management, input validation, Use when working with security-basics patterns. prompt injection defense, and data privacy.
Score 70/100
Extract and structure claims from discourse into analyzable argument maps with logical relationships and assumptions.
Score 70/100
Claims-based authorization for agents and operations. Grant, revoke, and verify permissions for secure multi-agent coordination.
Score 70/100
Secure Clari API tokens and implement data handling best practices. Use when managing API tokens, restricting data access, or implementing PII handling for exported forecast data.
Score 70/100
Executes the /clarify phase using AskUserQuestion tool to resolve ambiguities through structured questions (≤3), prioritization, and answer integration.
Score 70/100
Build autonomous AI agents with Claude Agent SDK. Structured outputs (v0.1.45, Nov 2025) guarantee JSON schema validation, plugins system, hooks for event-driven workflows.
Score 70/100
Answers questions about Claude Code features, configuration, and usage from local documentation synced from code.claude.com.
Score 70/100
Use when reviewing code for security vulnerabilities, implementing authentication/authorization, handling user input, or discussing web application security.
Score 70/100
Consult official Claude Code documentation from code.claude.com using selective fetching. Use when working on hooks, skills, subagents, plugins, agent teams, MCP servers,…
Score 70/100
CLAUDE Framework coding standards for code quality, naming conventions, error handling, security, testing, database, and logging
Score 70/100
Optimize oversized CLAUDE.md files using progressive disclosure. Analyzes content tiers, detects encryption constraints, creates sub-documents, and rewrites the main file with a…
Score 70/100
Discover, message, and coordinate AI coding agents (Claude Code, Codex CLI) running on the same machine via a shared Unix socket broker backed by SQLite.
Score 70/100
Access Claude Code session logs (JSONL transcripts and SQLite FTS index) for cross-session context, handoff, and memory retrieval.
Score 70/100
Professional skill creation with research-driven workflow and automated validation. USE WHEN: Creating new skills, validating existing skills, deciding between Skills vs…
Score 70/100
暗号化と鍵ライフサイクル管理スキル。暗号化アルゴリズム選定、 鍵生成、保管、ローテーション、廃棄の全フェーズを網羅します。 保存時・転送時・使用時の暗号化戦略を提供します。 📖 参照書籍: - 『The Pragmatic Programmer』(Andrew Hunt, David Thomas): 実践的改善 📚 リソース参照: -…
Score 70/100
Trail of Bits security skills analysis for Solidity contracts. Use for deep smart contract security review with invariant suggestions.
Score 70/100
Review code changes with criteria-driven analysis (Security, Architecture, Standards, Performance). Use when reviewing PRs or code changes.
Score 70/100
Security advisory feed package for OpenClaw-related threats and vulnerabilities. The upstream feed is updated daily; local automation is handled by clawsec-suite or the operator.
Score 70/100
Use when checking for security vulnerabilities in NanoClaw skills, before installing new skills, or when asked about security advisories affecting the bot
Score 70/100
Automated vulnerability scanner for agent platforms. Performs dependency scanning (npm audit, pip-audit), multi-database CVE lookup (OSV, NVD, GitHub Advisory), SAST analysis…
Score 70/100
ClawSec suite manager with embedded advisory-feed monitoring, cryptographic signature verification, approval-gated malicious-skill response, and guided setup for additional…
Score 70/100
Community incident reporting for AI agents. Contribute to collective security by reporting threats.
Score 70/100
Apply Clay security best practices for API keys, webhook secrets, and data access control. Use when securing Clay integrations, rotating API keys, auditing access, or implementing…
Score 70/100
Deep codebase cleanup — kills dead code, fixes all lint/format warnings, removes orphaned files, cleans stale TODOs, strips security hazards, tightens TypeScript strict mode, and…
Score 70/100
Guidelines for implementing Clerk authentication in Next.js applications with middleware, hooks, and security best practices
Score 70/100
Manage incident response for Clerk authentication issues. Use when handling auth outages, security incidents, or production authentication problems.
Score 70/100
Implement security best practices with Clerk authentication. Use when securing your application, reviewing auth implementation, or hardening Clerk configuration.
Score 70/100
Run 150+ AI apps via inference.sh CLI (infsh) — image generation, video creation, LLMs, search, 3D, social automation. Uses the terminal tool.
Score 70/100
Transform predictable story elements into fresh, original versions. Use when something feels generic, when feedback says "I've seen this before," when elements orbit the…
Score 70/100
Test and validate ClickHouse Cloud connection using clickhouse-connect for gapless-crypto-clickhouse.
Score 70/100
Store ClickHouse Cloud credentials in Doppler + 1Password for gapless-crypto-clickhouse. Use when setting up new services, rotating credentials, or backing up authentication…
Score 70/100
ClickHouse Cloud user and permission management. TRIGGERS - create ClickHouse user, ClickHouse permissions, ClickHouse Cloud credentials.
Score 70/100
Fetch ClickHouse Cloud service details from API (organization ID, service endpoints, configuration). Use when setting up new ClickHouse Cloud services, discovering endpoints, or…
Score 70/100