ClaudSkillsSecurity › Page 24

Claude Security Skills (Page 24 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,630 skills · updated 2026-05-03 · showing 1381–1440 of 2,630 by quality score

Build event-driven automations with Granola's Zapier webhook triggers. Use when creating real-time notification systems, processing meeting events, or building custom integrations…
Score 70/100
Build or incrementally update the code knowledge graph for a codebase. Uses Tree-sitter for multi-language AST parsing and stores nodes/edges in SQLite.
Score 70/100
Compares Trailmark code graphs at two source code snapshots (git commits, tags, or directories) to surface security-relevant structural changes.
Score 70/100
Secure GraphQL APIs - authentication, authorization, rate limiting, and validation
Score 70/100
Parallel persona planning for new projects. Research agent runs first to build domain context, then Architect, PM, and Security agents run in parallel.
Score 70/100
GreyCat C API and GCL Standard Library reference. Use for: (1) Native C development with gc_machine_t context, tensors, objects, memory management, HTTP, crypto, I/O; (2) GCL…
Score 70/100
Classify IP addresses as internet scanners (benign/malicious) or targeted attackers — filters noise from security alerts
Score 70/100
Operational knowledge for the grid_ctf scenario including strategy playbook, lessons learned, and resource references.
Score 70/100
Analyze smart grid and power distribution optimization code for power flow solver correctness, fault detection and restoration automation, distributed energy resource management,…
Score 70/100
Apply Groq security best practices for API key management and data protection. Use when securing API keys, implementing least privilege access, or auditing Groq security…
Score 70/100
Parallel-agent code review for quality, security, dependencies, and docs. Use for reviews, audits, or quality assessments. Produces deduplicated severity-ranked report.
Score 70/100
Scan container images, filesystems, and SBOMs for known vulnerabilities using Anchore Grype. Supports major OS package ecosystems and language-specific packages with EPSS risk…
Score 70/100
Review changed files for bugs, security issues, and code quality; produce REVIEW.md
Score 70/100
Use when hardening the Experience Cloud guest user profile, controlling unauthenticated access to records and Apex, or investigating data exposure through guest SOQL.
Score 70/100
Implement Guidewire RBAC: API roles, user permissions, and security policies. Trigger: "guidewire enterprise rbac", "enterprise-rbac".
Score 70/100
Implement Guidewire security: OAuth2 JWT, API roles, Gosu secure coding, and data protection. Trigger: "guidewire security basics", "security-basics".
Score 70/100
Quick install of the Google Workspace CLI (gws) on an additional machine using existing OAuth credentials. Requires client_secret.json from a previous gws-setup.
Score 70/100
Set up the Google Workspace CLI (gws) from scratch. Guides through GCP project creation, OAuth credentials, authentication, and installing 90+ agent skills for Claude Code.
Score 70/100
Lets an agent exercise REST, GraphQL, and gRPC authorization paths with YAML-defined role tests so BOLA, BFLA, broken authentication, and related API flaws are caught before…
Score 70/100
Use when you, your group, or someone you advise is being attacked with calculated personal insult, mockery, nickname-branding, or ridicule — not as a loss of temper by the…
Score 70/100
Expert Harbor container registry administrator specializing in registry operations, vulnerability scanning with Trivy, artifact signing with Notary, RBAC, and multi-region…
Score 70/100
Hardcoded Credential Finder - Auto-activating skill for Security Fundamentals. Triggers on: hardcoded credential finder, hardcoded credential finder Part of the Security…
Score 70/100
Harden-Runner by StepSecurity is a CI/CD security agent that works like an EDR for GitHub Actions runners.
Score 70/100
Hardens Windows endpoints using CIS (Center for Internet Security) Benchmark recommendations to reduce attack
Score 70/100
Hardware and embedded security research capabilities. Interface with JTAG debuggers, analyze SPI/I2C communications, dump and analyze firmware, support fault injection,…
Score 70/100
Multi-perspective review supporting code, plan, and scope analysis. Auto-detects review type from context.
Score 70/100
Calculate cryptographic hashes (MD5, SHA1, SHA256, SHA512) for text and files. Compare hashes, verify integrity, and batch process directories.
Score 70/100
Building LLM-powered React applications with the Hashbrown library. Use when the user asks to (1) Build generative UI where LLMs render React components, (2) Add client-side tool…
Score 70/100
The official HashiCorp Vault MCP server lets AI assistants read, write, list, and delete secrets in Vault's KV engine through a safe, auditable MCP interface.
Score 70/100
Connects to HashiCorp Vault HTTP API for automated secret rotation workflows. Manages dynamic database credentials via Vault database secrets engine, handles PKI certificate…
Score 70/100
Scans codebases for hardcoded secrets using HashiCorp Vault SDK and truffleHog patterns. Integrates with Vault Transit engine for automatic secret rotation and re-encryption of…
Score 70/100
CRITICAL security skill teaching proper credential and password handling. NEVER store passwords, use bcrypt/argon2, NEVER accept third-party credentials.
Score 70/100
Use when interacting with Hetzner Cloud via command line - managing servers, networks, volumes, load balancers, firewalls, DNS, or any cloud infrastructure operations with hcloud…
Score 70/100
Project health dashboard — compilation, tests, TODOs, API spec drift, migration pairs, deps, security, docs, bundle
Score 70/100
Comprehensive healthcare system compliance and security audit: review HIPAA Privacy and Security Rule adherence, check HITECH and 21st Century Cures Act obligations, validate…
Score 70/100
Audit a healthcare software codebase for HIPAA Privacy and Security Rule compliance, HITECH breach notification readiness, 21st Century Cures Act interoperability requirements,…
Score 70/100
中文优先:用于医疗PHI合规相关任务,帮助识别、设计、实现或验证对应工作流。English keywords: Protected Health Information (PHI) and Personally Identifiable Information (PII) compliance patterns for healthcare…
Score 70/100
Host security hardening and risk-tolerance configuration for Otto deployments. Use when a user asks for security audits, firewall/SSH/update hardening, risk posture, exposure…
Score 70/100
Build frontend Solana applications with Phantom Connect SDK and Helius infrastructure. Covers React, React Native, and browser SDK integration, transaction signing via Helius…
Score 70/100
Self-host any open-source app on the user's own infrastructure (cloud VM, VPS, Raspberry Pi, localhost, k8s, PaaS).
Score 70/100
Hermes-only runtime security attestation and drift detection skill for operator-managed Hermes infrastructure.
Score 70/100
Convert local Hermes operator workflows into sanitized ECC skills and release-pack artifacts. Use when preparing a Hermes workflow for public ECC reuse without leaking private…
Score 70/100
Hetzner Cloud CLI for managing servers, volumes, firewalls, networks, DNS, and snapshots.
Score 70/100
Use when deploying, managing, or troubleshooting Hetzner Cloud infrastructure via hcloud CLI. Triggers: "hetzner cloud", "hcloud", "hetzner server", "create server on hetzner",…
Score 70/100
Apply Hex security best practices for secrets and access control. Use when securing API keys, implementing least privilege access, or auditing Hex security configuration.
Score 70/100
Initialize HuggingFace integration - validates .env variables, tests API connectivity, and ensures the dataset repository structure exists.
Score 70/100
Quantitative trading expertise for DeFi and crypto derivatives. Use when building trading strategies, signals, risk management.
Score 70/100
Deep HIPAA Security Rule technical audit mapping code-level findings to 45 CFR sections. Covers administrative safeguards (164.308 -- risk analysis, workforce security, access…
Score 70/100
Hipaa Audit Helper - Auto-activating skill for Security Advanced. Triggers on: hipaa audit helper, hipaa audit helper Part of the Security Advanced skill category.
Score 70/100
Ensure HIPAA compliance when handling PHI (Protected Health Information). Use when writing code that accesses user health data, check-ins, journal entries, or any sensitive…
Score 70/100
Fetch and send Hacker News front-page posts on demand. Use when the user asks for HN, says 'hn', 'pull HN', 'hn 10', or specifies a topic like 'hn health', 'hn hacking', or 'hn…
Score 70/100
Build type-safe APIs with Hono for Cloudflare Workers, Deno, Bun, Node.js. Routing, middleware, validation (Zod/Valibot), RPC, streaming (SSE), WebSocket, security (CSRF,…
Score 70/100
Guide for creating Claude Code hooks with security-first design. Use for validation, logging, and policy enforcement.
Score 70/100
Guide Hook creation with mandatory security review checklist, event selection, and safety validation.
Score 70/100
Use when creating, modifying, or debugging Claude Code hooks — PreToolUse, PostToolUse, Stop, SubagentStop, SessionStart, SessionEnd, UserPromptSubmit, PreCompact, Notification.
Score 70/100
Create event-driven hooks for Claude Code automation. Use when the user wants to create hooks, automate tool validation, add pre/post processing, enforce security policies, or…
Score 70/100
Create, validate, and deploy Claude Code hooks for workflow automation. Hooks enable event-driven automation at 8 lifecycle points (PreToolUse, PostToolUse, UserPromptSubmit,…
Score 70/100
Apply Hootsuite security best practices for secrets and access control. Use when securing API keys, implementing least privilege access, or auditing Hootsuite security…
Score 70/100
Horcrux splits files into encrypted fragments using Shamir Secret Sharing, so you can distribute pieces across locations and reconstruct the original with a configurable threshold…
Score 70/100
Executes Hostinger API operations via Python wrapper. Use when managing VPS instances, Docker Compose projects, DNS records, domains, firewalls, SSH keys, snapshots, backups,…
Score 70/100
Search all 2,630 Security skills →