ClaudSkillsSecurity › Page 19

Claude Security Skills (Page 19 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,630 skills · updated 2026-05-03 · showing 1081–1140 of 2,630 by quality score

Domain reconnaissance coordinator that orchestrates subdomain discovery and port scanning to build comprehensive domain attack surface inventory
Score 70/100
Kullanıcının belirttiği anahtar kelimeleri ve sayısal hedefleri kullanarak yaratıcı ve akılda kalıcı domain isimleri listeler. Kısa versiyon taleplerine göre uzunluk ayarı yapar.
Score 70/100
NeRDS software development guidelines for Dutch government projects. Use when making architectural decisions, setting up CI/CD, implementing security practices, handling privacy…
Score 70/100
Security standards and authentication tools for Dutch government software. Use when implementing DigiD, eHerkenning, OAuth, OIDC, PKIoverheid, or other Dutch government…
Score 70/100
Record and query the decision log for a project. Activate when user mentions "audit", "trail", "log decisions", "decision history", "why was this decided", "ADR", "architecture…
Score 70/100
Perform strict 7-dimension peer review analyzing correctness, tests, performance, architecture, security, style, and diff cleanliness.
Score 70/100
Perform OWASP Top 10 static security audit identifying vulnerabilities in access control, cryptography, injection, configuration, and logging.
Score 70/100
Validate and test Doppler secrets. TRIGGERS - add to Doppler, store secret, validate token, test credentials.
Score 70/100
Doppler credential and publishing workflows. TRIGGERS - PyPI publish, AWS credentials, Doppler secrets.
Score 70/100
Find denial of service vulnerabilities through resource exhaustion, algorithmic complexity, memory exhaustion, and file/network resource abuse.
Score 70/100
dotenvx - secure environment variable management with encryption. Use for encrypting .env files, multi-environment configuration, cross-platform secret management, and migrating…
Score 70/100
dotenvx is a secure, cross-platform environment variable manager from the creator of dotenv. It provides encrypted .env files, multi-environment support, and works with any…
Score 70/100
Default-Deny security posture for Supabase. Mandates strict RLS and 'WITH CHECK' clauses.
Score 70/100
Default-Deny security posture for Supabase. Mandates strict RLS and 'WITH CHECK' clauses.
Score 70/100
Manage database schema with Drizzle ORM and SQLite migrations. Use when adding tables, modifying columns, creating indexes, or running migrations.
Score 70/100
Drizzle ORM best practices including schema design with relationships, database migrations, prepared statements for performance, transactions, indexes, Turso SQLite database…
Score 70/100
ALWAYS USE when building data lakehouse with DuckDB compute, configuring dbt-duckdb with Polaris plugin, or designing catalog-first architecture in floe-platform.
Score 70/100
Query remote Parquet files via HTTP without downloading using DuckDB httpfs. Leverage column pruning, row filtering, and range requests for efficient bandwidth usage.
Score 70/100
Comprehensive application audit. Analyzes best practices, security compliance, frontend design quality. Identifies top improvements and critical errors.
Score 70/100
Create and review Cloudflare Durable Objects. Use when building stateful coordination (chat rooms, multiplayer games, booking systems), implementing RPC methods, SQLite storage,…
Score 70/100
Expert on EAS Build cloud service for building iOS and Android apps. Covers build configuration, credentials management, custom builds, CI/CD integration, and troubleshooting.
Score 70/100
Property-based testing and fuzzing using Echidna for smart contracts. Includes invariant definition, corpus management, coverage analysis, and CI/CD integration for comprehensive…
Score 70/100
Scan one dependency surface, draft the advisory, and package the approved publication bundle.
Score 70/100
Generate diagrams from natural language using EdrawMax AI APIs. Supports four diagram types: flowchart (流程图), infographic (信息图), Gantt chart (甘特图), and mind map (思维导图).
Score 70/100
IAM Roles for Service Accounts (IRSA) for EKS pod-level AWS permissions. Use when configuring pod IAM access, setting up AWS service integrations, implementing least-privilege…
Score 70/100
EKS networking configuration including VPC CNI, load balancers, and network policies. Use when setting up cluster networking, configuring ingress/load balancing, implementing…
Score 70/100
EKS security hardening and best practices. Use when configuring cluster security, implementing pod security, managing secrets, preparing for compliance audits, hardening…
Score 70/100
Cross-platform specifics for Electrobun apps — platform support matrix, Linux/Windows/macOS behavioral differences, CEF requirements by platform, events API, security patterns, CI…
Score 70/100
Build secure desktop applications with Electron 33, Vite, React, and TypeScript. Covers type-safe IPC via contextBridge, OAuth with custom protocol handlers, native module…
Score 70/100
Analyze Electron IPC implementations for security vulnerabilities including contextIsolation, nodeIntegration, preload scripts, and channel validation
Score 70/100
Implement Electron desktop app patterns for PhotoVault bulk uploader. Use when working with main/renderer process communication, chunked uploads, preload scripts, protocol…
Score 70/100
Desktop application specialist building secure cross-platform solutions. Develops Electron apps with native OS integration, focusing on security, performance, and seamless user…
Score 70/100
Electron patterns for LlamaFarm Desktop. Covers main/renderer processes, IPC, security, and packaging.
Score 70/100
Install and configure ElevenLabs SDK authentication for Node.js or Python. Use when setting up a new ElevenLabs project, configuring API keys, or initializing the elevenlabs…
Score 70/100
Apply ElevenLabs security best practices for API keys, webhook HMAC validation, and voice data protection.
Score 70/100
Edit an existing elisym agent's profile (display name, avatar, banner, description, relays, payment addresses, LLM provider/model, security flags) by patching elisym.yaml…
Score 70/100
Email operations skill for sending, fetching, and reading emails via IMAP/SMTP. Uses curl with OpenSSL/LibreSSL for reliable TLS compatibility with Tencent Enterprise Mail and…
Score 70/100
Analyze email messages and mailbox data for forensic investigation. Use when investigating phishing attacks, business email compromise, insider threats, or any scenario requiring…
Score 70/100
Production-ready Gmail and Outlook OAuth integration for Next.js with Supabase. Handles email scopes, token refresh, permission management, and secure API access for…
Score 70/100
Configure email verification, implement password reset flows, set password policies, and customise hashing algorithms for Better Auth email/password authentication.
Score 70/100
Embedded cryptographic operations and secure element integration. Expert skill for hardware crypto accelerators, secure key storage, TrustZone configuration, and side-channel…
Score 70/100
Crypto wallet management across 7 blockchains via EmblemAI Agent Hustle API. Balance checks, token swaps, portfolio analysis, and transaction execution for Solana, Ethereum, Base,…
Score 70/100
Audit an emergency resource management system for crisis readiness. Evaluates inventory tracking accuracy, deployment request-to-arrival pipeline, logistics and route…
Score 70/100
Use age-plugin-yubikey when an agent needs age encryption tied to a physical YubiKey identity instead of software-only keys.
Score 70/100
Design SOQL, filters, reporting, and indexes against Shield Platform Encryption fields. Trigger keywords: Shield Platform Encryption, encrypted field query, probabilistic vs…
Score 70/100
Validate encryption implementations and cryptographic practices. Use when reviewing data security measures.
Score 70/100
Audit and harden encryption across the full stack. Checks data-at-rest encryption (database TDE, field-level AES-256-GCM, file storage SSE, backup encryption), data-in-transit…
Score 70/100
AES-256-GCM encryption for sensitive credentials (BYOD/BYOK). Node crypto, IV + authTag storage, multi-field colon-separated IVs.
Score 70/100
Encryption At Rest Checker - Auto-activating skill for Security Advanced. Triggers on: encryption at rest checker, encryption at rest checker Part of the Security Advanced skill…
Score 70/100
Audit energy utility software for NERC CIP cybersecurity, FERC market and tariff compliance, EPA emissions and CEMS reporting, renewable portfolio standards (RPS/REC tracking),…
Score 70/100
Operate long-lived agent workloads with observability, security boundaries, and lifecycle management.
Score 70/100
Production-grade AI architecture patterns for enterprise - security, governance, scalability, and operational excellence
Score 70/100
Three-tier enterprise code analysis system. Tier 1 analyzes individual repositories (structure, patterns, dependencies, memory).
Score 70/100
Central authority for Claude Code enterprise security. Covers enterprise managed policies (managed-settings.json), settings precedence hierarchy, policy file locations (macOS,…
Score 70/100
Guides Microsoft Entra ID app registration, OAuth 2.0 authentication, and MSAL integration. USE FOR: create app registration, register Azure AD app, configure OAuth, set up…
Score 70/100
Entrepreneurship, innovation, and disruption for starting, scaling, and defending new ventures. Covers opportunity recognition, jobs-to-be-done, the disruptive innovation…
Score 70/100
Enumerate and exploit network services including SMB, FTP, SSH, RDP, HTTP, databases (MySQL, MSSQL, PostgreSQL, MongoDB), LDAP, NFS, DNS, and SNMP.
Score 70/100
Environment configuration and secrets management skill using UV for Python projects. Handles .env files, environment variables, secrets encryption, multi-environment setups, and…
Score 70/100
Diagnose and fix Laravel environment configuration issues, cache problems, and database connection errors.
Score 70/100
Generates .env.local file for local development environment variables. Contains developer-specific configuration like API URLs, ports, and feature flags. Gitignored for security.
Score 70/100
Search all 2,630 Security skills →