Pre-breach impact analysis: inventories sensitive data (PII, PHI, PCI-DSS, credentials), traces data flows, scores exposure vectors, and produces a regulatory blast radius report…
Score 70/100
Classify Salesforce fields by data sensitivity and compliance category using the four built-in classification attributes (SecurityClassification, ComplianceGroup, BusinessOwnerId,…
Score 70/100
Implement strong encryption using AES, RSA, TLS, and proper key management. Use when securing data at rest, in transit, or implementing end-to-end encryption.
Score 70/100
Import Synnovator platform data from .synnovator/*.md files into SQLite database via SQLAlchemy models.
Score 70/100
Conception de dashboards Power BI — DAX, modèle de données, visualisations avancées et Row-Level Security.
Score 70/100
Understanding and managing what digital services collect, store, share, and infer about you. Covers password security and entropy, multi-factor authentication, privacy settings,…
Score 70/100
Set up database replication for high availability and disaster recovery. Use when configuring master-slave replication, multi-master setups, or replication monitoring.
Score 70/100
Comprehensive data safety auditor for Vue 3 + Pinia + IndexedDB + PouchDB applications. Detects data loss risks, sync issues, race conditions, and browser-specific vulnerabilities…
Score 70/100
Comprehensive data safety auditor for Vue 3 + Pinia + IndexedDB + PouchDB applications. Detects data loss risks, sync issues, race conditions, and browser-specific vulnerabilities…
Score 70/100
Ensure Alpaca API is used for quality data, not yfinance fallback. Trigger when: (1) crypto volume filter fails unexpectedly, (2) zero-volume bars in data, (3) API key…
Score 70/100
Production-grade SQL optimization for OLTP systems: EXPLAIN/plan analysis, balanced indexing, schema and query design, migrations, backup/recovery, HA, security, and safe…
Score 70/100
Implement client-side data storage with localStorage, IndexedDB, or SQLite WASM. Use when storing user preferences, caching data, or building offline-first applications.
Score 70/100
Implement backup and restore strategies for disaster recovery. Use when creating backup plans, testing restore procedures, or setting up automated backups.
Score 70/100
Domain specialist for data persistence, database design, query optimization, and data modeling. Scope: SQL injection prevention, indexing strategies, normalization, migrations,…
Score 70/100
REQUIRED before implementing any game feature, scoring logic, state transition, or decision-making. ALL business logic lives in PostgreSQL - frontend is presentation only.
Score 70/100
Implement SQLite database patterns using the database.py interface with complete SQL isolation. MANDATORY for all database projects.
Score 70/100
Implement SQLite database patterns using the database.py interface with complete SQL isolation. MANDATORY for all database projects.
Score 70/100
Use when creating database migrations. Prevents data loss, downtime, and performance issues. Supports PostgreSQL, MySQL, SQLite. Python 3.8+
Score 70/100
SQLite database migration patterns for SpecFlux. Use when creating new tables, modifying schema, adding indexes, or running migrations.
Score 70/100
Review database schema design, query patterns, and data access layer for correctness and performance.
Score 70/100
Analyze PostgreSQL/Supabase database schemas for design quality, security, performance, and best practices.
Score 70/100
Expert guidance for designing, optimizing, and maintaining database schemas for SQL and NoSQL systems.
Score 70/100
Apply Databricks security best practices for secrets and access control. Use when securing API tokens, implementing least privilege access, or auditing Databricks security…
Score 70/100
Kailash DataFlow - zero-config database framework with automatic model-to-node generation. Use when asking about 'database operations', 'DataFlow', 'database models', 'CRUD…
Score 70/100
Datasette is an open-source Python tool for exploring and publishing data. It turns any SQLite database into an interactive web interface with a JSON API, enabling data…
Score 70/100
Open and operate the local DB Craft visual schema studio at D:\DBdesigner. Use it to design or edit MySQL 8, PostgreSQL 14, SQLite, and MSSQL models, generate tables with AI,…
Score 70/100
dbmate is a standalone, framework-agnostic database migration tool that uses plain SQL files. It supports PostgreSQL, MySQL, SQLite, ClickHouse, BigQuery, and Spanner, and works…
Score 70/100
Merge two tracking issues that describe the same root-cause vulnerability (typically discovered independently by two reporters, arriving via different channels),…
Score 70/100
Install and configure Deepgram SDK authentication. Use when setting up a new Deepgram integration, configuring API keys, or initializing Deepgram in your project.
Score 70/100
Apply Deepgram security best practices for API key management and data protection. Use when securing Deepgram integrations, implementing key rotation, or auditing security…
Score 70/100
Guide for implementing DefectDojo - an open-source DevSecOps, ASPM, and vulnerability management platform.
Score 70/100
Trigger Windows Defender scans, check threat history, update signatures, and query protection status via PowerShell
Score 70/100
Implement mitigations, create input filters, design output guards, and build defensive prompting for LLM security
Score 70/100
Analyze defense supply chain systems — DFARS compliance assessment, CMMC cybersecurity readiness, sole-source and DMSMS risk identification, counterfeit parts prevention per SAE…
Score 70/100
中文优先:用于DeFiAMM安全相关任务,帮助识别、设计、实现或验证对应工作流。English keywords: Security checklist for Solidity AMM contracts, liquidity pools, and swap flows.
Score 70/100
Use when testing plans or decisions for blind spots, need adversarial review before launch, validating strategy against worst-case scenarios, building consensus through structured…
Score 70/100
Run DEM lineament analysis to identify unmapped fault structures. Use when visually confirming orphan earthquake clusters, mapping fault extensions, or finding dark earthquake…
Score 70/100
Deobfuscates malicious JavaScript code used in web-based attacks, phishing pages, and dropper scripts by reversing
Score 70/100
Systematically deobfuscate multi-layer PowerShell malware using AST analysis, dynamic tracing, and tools like
Score 70/100
Fix Dependabot security vulnerabilities in Java/Gradle projects using severity-based processing, dependency substitution strategies, and dependency graph verification.
Score 70/100
Analyze project dependencies for health, security, and bloat — audit outdated, deprecated, vulnerable, duplicate, heavy, and unused packages across npm, pip, cargo, go mod, and…
Score 70/100
Analyze project dependencies for vulnerabilities, updates, and optimization opportunities. Use when auditing dependencies or managing package versions.
Score 70/100
Provides dependency management and supply chain security practices for auditing vulnerabilities, checking licenses, assessing dependency health, and managing upgrades safely.
Score 70/100
Reviews package dependencies for security vulnerabilities, outdated versions, and license compliance. Use when user asks about dependencies, security audits, or before releases.
Score 70/100
Periodically scan project dependencies for security vulnerabilities, outdated packages, and unused dependencies. Produces a prioritized action report.
Score 70/100
Automated security auditing of project dependencies to identify known vulnerabilities.
Score 70/100
Audit dependencies — npm audit, govulncheck, pip-audit, cargo-audit, outdated packages, update plan
Score 70/100
Detect and resolve package dependency conflicts before installation across npm/yarn/pnpm, pip/poetry, cargo, and composer. Auto-trigger when installing/upgrading packages.
Score 70/100
Diagnose and heal dependency issues in ANY package manager, ANY language. Use when facing version conflicts, security vulnerabilities, or dependency bloat.
Score 70/100
Automated dependency management with security scanning, update orchestration, and compatibility validation
Score 70/100
Security-first dependency management methodology with batch remediation, policy-driven compliance, and automated enforcement.
Score 70/100
Python dependency and environment management for multi-service or monorepo python backends. Use when: (1) adding, upgrading, or removing a Python package, (2) responding to…
Score 70/100
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security.
Score 70/100
Expert dependency manager specializing in package management, security auditing, and version conflict resolution across multiple ecosystems.
Score 70/100
Audit dependencies for licensing, security, and maintenance risk. Use when a senior developer needs risk assessment.
Score 70/100
Scan project dependencies for known vulnerabilities (CVEs), auto-fix safe patches, and generate SBOM.
Score 70/100
Enforce dependency security scanning and SBOM generation. Use when adding dependencies, reviewing package.json, or during security audits.
Score 70/100
Vet new package dependencies before installation. Triggers when adding packages via pip, npm, yarn, or similar package managers.
Score 70/100
Dependency Vulnerability Checker - Auto-activating skill for Security Fundamentals. Triggers on: dependency vulnerability checker, dependency vulnerability checker Part of the…
Score 70/100
Scans project dependencies using OSV.dev API and Snyk CLI for known CVEs across npm, PyPI, Maven, and Go modules. Generates SBOM in CycloneDX format via syft.
Score 70/100