ClaudSkillsSecurity › Page 22

Claude Security Skills (Page 22 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,630 skills · updated 2026-05-03 · showing 1261–1320 of 2,630 by quality score

Apply Fireflies.ai security best practices for API keys and webhook verification. Use when securing API keys, verifying webhook signatures, or auditing Fireflies.ai security…
Score 70/100
Analyze Firefox bookmarks and tags directly from the places.sqlite database. Extract recent bookmarks, analyze tag popularity, find bookmark statistics, and explore bookmark…
Score 70/100
Comprehensive guide for developing WebExtensions (browser extensions) for Mozilla Firefox, including Manifest V2/V3 configuration, all WebExtension APIs, security practices,…
Score 70/100
A skill to evaluate how secure Firestore security rules are. Use this when Firestore security rules are updated to ensure that the generated rules are extremely secure and robust.
Score 70/100
Firestore Security Rules patterns for user-scoped access, RBAC with custom claims, multi-tenant isolation, field validation, immutable fields, and testing strategies.
Score 70/100
Configuration de firewalls et règles de sécurité réseau pour iptables, pfSense, Azure NSG et AWS Security Groups.
Score 70/100
Firewall Rule Generator - Auto-activating skill for GCP Skills. Triggers on: firewall rule generator, firewall rule generator Part of the GCP Skills skill category.
Score 70/100
Use when building Flutter/Dart apps, debugging Flutter issues, reviewing Flutter PRs, choosing state management, testing widgets/providers, optimizing Flutter performance, or…
Score 70/100
Security hardening superbrain — CWE Top 25, STRIDE threat modeling, Electron hardening, encryption, dependency audits, OWASP compliance
Score 70/100
Expert firmware analyst specializing in embedded systems, IoT security, and hardware reverse engineering.
Score 70/100
Fiscaliste IA pour la fiscalité personnelle des contribuables français. Copilote pour l'optimisation et la déclaration de l'impôt sur le revenu, l'IFI, les revenus du capital, les…
Score 70/100
Fix all guardrail findings (make lint, make test, make sast) across repositories. Use when the user asks to fix linting errors, test failures, SAST findings, or run the full…
Score 70/100
Attempt to fix a security issue tracked in by implementing the change in a public PR.
Score 70/100
Fix Dependabot security vulnerabilities in Java/Gradle projects using severity-based processing, dependency substitution strategies, and dependency graph verification.
Score 70/100
Install and configure Flexport API authentication with API keys or OAuth credentials. Use when setting up a new Flexport logistics integration, configuring bearer tokens, or…
Score 70/100
Apply Flexport API security best practices including webhook signature verification, API key rotation, and least-privilege access patterns.
Score 70/100
Use when calling external REST APIs from Salesforce Flow without writing Apex: registering API specs as External Services, using generated invocable actions in Flow Builder, using…
Score 70/100
Decide and audit the security boundary a Flow runs at — System Context With Sharing, System Context Without Sharing, or User Context — plus the per-element runInMode override and…
Score 70/100
Orchestrate continuous security validation, threat modeling, vulnerability management, and security gate enforcement across SDLC phases
Score 70/100
Trace data flow across files from source to sink. Use for cross-file taint analysis, understanding how user input reaches dangerous sinks, and documenting vulnerability paths.
Score 70/100
Complete guide for using drift database library in Flutter applications. Use when building Flutter apps that need local SQLite database storage with type-safe queries, reactive…
Score 70/100
Apply Fly.io security best practices for secrets management, private networking, TLS certificates, and deploy token scoping.
Score 70/100
Apply security best practices for Fondo including OAuth token management, financial data protection, SOC 2 compliance, and access control.
Score 70/100
Forensics Data Collector - Auto-activating skill for Security Advanced. Triggers on: forensics data collector, forensics data collector Part of the Security Advanced skill…
Score 70/100
SQL-powered forensic investigation and system interrogation using osquery to query operating systems as relational databases.
Score 70/100
Audit existing infrastructure for security issues, waste, and misconfigurations. Use when asked to "audit my infra", "check cloud setup", "infra review", "are we wasting money",…
Score 70/100
Design and build networking infrastructure — VPCs, subnets, DNS, load balancers, firewall rules. Use when asked to "set up networking", "VPC design", "configure DNS", "load…
Score 70/100
Security patterns for web forms including autocomplete attributes for password managers, CSRF protection, XSS prevention, and input sanitization.
Score 70/100
Static security analysis of HTML forms without sending any requests. Checks for CSRF tokens, insecure actions, missing validation, hidden field issues, and common security…
Score 70/100
Router for web form development. Use when creating forms, handling validation, user input, or data entry across React, Vue, or vanilla JavaScript.
Score 70/100
Expert in Gravito security and authentication. Trigger this when setting up Auth, configuring CSP, or implementing security middleware.
Score 70/100
Pure mathematical structure. Sets, groups, rings, fields, topology — the formal bedrock everything else rests on.
Score 70/100
Manages founder business portfolio, signals, vault, and snapshots. Tracks business health, stores credentials securely, and generates AI-powered business analytics and…
Score 70/100
Decision validation and thinking frameworks for startup founders. Use when you need to pressure-test a decision, validate your next steps, think through strategic options, or…
Score 70/100
Apply Framer security best practices for secrets and access control. Use when securing API keys, implementing least privilege access, or auditing Framer security configuration.
Score 70/100
Manage the freshie ecosystem inventory database — a CMDB tracking all plugins, skills, packs, and compliance grades across 50 SQLite tables.
Score 70/100
Analyzes FedRAMP FRMR documents to extract control mappings, KSI entries, and version changes. Use when the user asks about FedRAMP requirements, control mappings, compliance…
Score 70/100
Ultimate 25+ years expert-level frontend skill covering Next.js, React, TypeScript, Tailwind CSS, styled-components, Redux, Zustand, Webpack, Vite, Parcel, Jest/Vitest testing,…
Score 70/100
You are a frontend security specialist focusing on Cross-Site Scripting (XSS) vulnerability detection and prevention.
Score 70/100
Audit frontend codebases for security vulnerabilities and bad practices. Use when performing security reviews, auditing code for XSS/CSRF/DOM vulnerabilities, checking Content…
Score 70/100
Secure Solana frontends against phishing, bad prompts, and unsafe signing requests. Use for audits of wallet UX and dApp sites.
Score 70/100
Expert in secure frontend coding practices specializing in XSS prevention, output sanitization, and client-side security patterns.
Score 70/100
Implement data persistence using SQLite with Dapper, JSON files, or event sourcing. Use when: "database", "save data", "store", "CRUD", "create table", "query", "SQL", "SQLite",…
Score 70/100
Master-level fullstack software engineering with deep backend expertise. Use when building production-grade APIs, database architectures, authentication systems, microservices, or…
Score 70/100
Builds security-focused full-stack web applications by implementing integrated frontend and backend components with layered security at every level.
Score 70/100
Essential fuzzing payloads: SQL injection, command injection, special characters. Curated essentials for vulnerability testing.
Score 70/100
Configure perform API fuzzing to discover edge cases, crashes, and security vulnerabilities. Use when performing specialized testing.
Score 70/100
Configure perform API fuzzing to discover edge cases, crashes, and security vulnerabilities. Use when performing specialized testing.
Score 70/100
Building effective fuzzing harnesses to maximize code coverage and vulnerability discovery through automated input generation
Score 70/100
Analyze in-game economy systems including soft and hard currency source-sink balance, inflation projection modeling, loot table drop rate fairness and pity system evaluation,…
Score 70/100
Pre-launch quality gate for games: audit rendering and memory performance against platform budgets, run QA for crash-causing defects and platform certification blockers, review…
Score 70/100
Audits existing game code against design principles — checks server-authority, schema conventions, auth security, payment safety, narrative coherence, and MVP scope drift.
Score 70/100
Game-specific security review covering cheat prevention, exploit surfaces, and server authority. Audits client-side authority vulnerabilities (damage, health, currency, cooldown,…
Score 70/100
Implement security best practices for Gamma integration. Use when securing API keys, implementing access controls, or auditing Gamma security configuration.
Score 70/100
Onboard company employees (Claude Code CLI users) to use gapless-crypto-clickhouse package with ClickHouse Cloud credentials.
Score 70/100
Run a Claude Code powered security review pass on trusted pull requests so suspicious auth, secret, injection, and unsafe logic changes surface before merge.
Score 70/100
The drum sounds. Spider and Raccoon gather for complete security work. Use when implementing auth or auditing security end-to-end.
Score 70/100
Elite incident response and legal compliance guidance for data breaches under GDPR Articles 33 & 34. Use when: (1) User reports a data breach or security incident, (2) User asks…
Score 70/100
Gdpr Compliance Scanner - Auto-activating skill for Security Advanced. Triggers on: gdpr compliance scanner, gdpr compliance scanner Part of the Security Advanced skill category.
Score 70/100
GeckoTerminal API - DeFi and DEX aggregator providing real-time cryptocurrency prices, trading volumes, OHLCV charts, and liquidity data across 250+ blockchain networks and 1,800+…
Score 70/100
Search all 2,630 Security skills →