ClaudSkillsSecurity › Page 25

Claude Security Skills (Page 25 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,630 skills · updated 2026-05-03 · showing 1441–1500 of 2,630 by quality score

Http Header Security Audit - Auto-activating skill for Security Fundamentals. Triggers on: http header security audit, http header security audit Part of the Security Fundamentals…
Score 70/100
Angular 21+ functional HTTP interceptors for auth, error handling, loading states, retry logic, caching, and security best practices
Score 70/100
Https Certificate Checker - Auto-activating skill for Security Fundamentals. Triggers on: https certificate checker, https certificate checker Part of the Security Fundamentals…
Score 70/100
httpx by ProjectDiscovery is a fast, multi-purpose HTTP toolkit for running probes against lists of hosts.
Score 70/100
Apply HubSpot security best practices for tokens, scopes, and webhook verification. Use when securing private app tokens, implementing least privilege scopes, or validating…
Score 70/100
HuLa project skill for frontend (Vue 3 + Vite + UnoCSS + Naive UI/Vant), backend (Tauri v2 + Rust + SeaORM/SQLite), full-stack flows, and build/release work.
Score 70/100
Elimina patrones de escritura típicos de IA en textos en español de España para que suenen naturales y humanos.
Score 70/100
Expert guidance on Hummingbird 2 web framework. Use when developers mention: (1) Hummingbird, HB, or Hummingbird 2, (2) Swift web server or HTTP server, (3) server-side Swift…
Score 70/100
Hummingbot trading bot framework - automated trading strategies, market making, arbitrage, connectors for crypto exchanges.
Score 70/100
Expert guidance for proactive threat hunting. Use this when the user asks to "hunt" for threads, IOCs, or specific TTPs.
Score 70/100
Proactively hunts for Advanced Persistent Threat (APT) activity within enterprise environments using hypothesis-driven
Score 70/100
Detects credential stuffing attacks by analyzing authentication logs for login velocity anomalies, ASN diversity,
Score 70/100
Detect DCSync attacks by analyzing Windows Event ID 4662 for unauthorized DS-Replication-Get-Changes requests
Score 70/100
Detect NTLM relay attacks by analyzing Windows Event 4624 logon type 3 with NTLMSSP authentication, identifying
Score 70/100
Hunt for spearphishing campaign indicators across email logs, endpoint telemetry, and network data to detect
Score 70/100
Look up HVAC equipment specifications (capacity, efficiency, dimensions, electrical requirements) by brand and model number.
Score 70/100
Infrastructure as Code (IaC) security scanning using Checkov with 750+ built-in policies for Terraform, CloudFormation, Kubernetes, Dockerfile, and ARM templates.
Score 70/100
Scans Infrastructure as Code for security misconfigurations. Wraps tfsec for Terraform and Checkov for multi-cloud IaC.
Score 70/100
Iam Policy Reviewer - Auto-activating skill for Security Advanced. Triggers on: iam policy reviewer, iam policy reviewer Part of the Security Advanced skill category.
Score 70/100
Provides comprehensive IBM Cloud platform guidance including compute services (VPC, Virtual Servers, IKS, OpenShift, Code Engine, Cloud Functions), storage (Object Storage, Block…
Score 70/100
Provides comprehensive IBM Mainframe administration, development, and modernization guidance including z/OS operations, JCL scripting, COBOL/PL/I programming, CICS/IMS…
Score 70/100
Apply Ideogram security best practices for API key management and access control. Use when securing API keys, implementing key rotation, or auditing Ideogram security…
Score 70/100
Query macOS iMessage database (chat.db) via SQLite. Decode NSAttributedString messages, handle tapbacks, search conversations.
Score 70/100
Write clear, emotionally resonant, and well-structured content that readers remember and act upon. Use when writing or editing any text—Twitter posts, articles, documentation,…
Score 70/100
Production-ready safety checklists for Rails implementation. Covers nil safety, ActiveRecord patterns, security vulnerabilities, error handling, and performance.
Score 70/100
AES (Advanced Encryption Standard) is a symmetric block cipher standardized by NIST (FIPS 197) used to protect
Score 70/100
Security awareness training is the human layer of phishing defense. An effective anti-phishing training program
Score 70/100
Configures Windows Group Policy Objects (GPO) to prevent ransomware execution and limit its spread. Implements
Score 70/100
Implements security controls at the API gateway layer including authentication enforcement, rate limiting, request
Score 70/100
Implements secure API key generation, storage, rotation, and revocation controls to protect API authentication
Score 70/100
Implement API schema validation using OpenAPI specifications and JSON Schema to enforce input/output contracts
Score 70/100
Implement API Security Posture Management to continuously discover, classify, and score APIs based on risk while
Score 70/100
Implement comprehensive API security testing using the 42Crunch platform to perform static audit and dynamic
Score 70/100
Implement API threat protection using Google Apigee policies including JSON/XML threat protection, OAuth 2.0,
Score 70/100
Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues
Score 70/100
Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize
Score 70/100
Implements external attack surface management (EASM) using Shodan, Censys, and ProjectDiscovery tools (subfinder,
Score 70/100
Implements AWS Nitro Enclave-based confidential computing environments with cryptographic attestation, KMS policy
Score 70/100
Implementing AWS Security Hub to aggregate security findings across AWS accounts, enable compliance standards
Score 70/100
Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and
Score 70/100
Deploys DNS, HTTP, and AWS API key canary tokens across network infrastructure to detect unauthorized access
Score 70/100
Implementing Cloud Security Posture Management (CSPM) to continuously monitor multi-cloud environments for misconfigurations,
Score 70/100
Implementing AWS CloudTrail log analysis for security monitoring, threat detection, and forensic investigation
Score 70/100
Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source
Score 70/100
Implements cloud workload protection using boto3 and google-cloud APIs for runtime security monitoring, process
Score 70/100
Implement and maintain compliance with SOC 2, HIPAA, PCI-DSS, and GDPR using unified control mapping, policy-as-code enforcement, and automated evidence collection.
Score 70/100
Implement secure conduit architecture for OT remote access following IEC 62443 zones and conduits model, deploying
Score 70/100
Reduce container attack surface by building application images on Google distroless base images that contain
Score 70/100
Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating
Score 70/100
Configure Cloudflare DDoS protection with managed rulesets, rate limiting, WAF rules, Bot Management, and origin
Score 70/100
Implements Delinea Secret Server for privileged access management (PAM) including secret vault configuration,
Score 70/100
Integrates Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software
Score 70/100
The Diamond Model of Intrusion Analysis provides a structured framework for analyzing cyber intrusions by examining
Score 70/100
Implements full disk encryption using Microsoft BitLocker on Windows endpoints to protect data at rest from
Score 70/100
SPF, DKIM, and DMARC form the three pillars of email authentication. Together they prevent domain spoofing, validate
Score 70/100
Implements eBPF-based security monitoring using Cilium Tetragon for real-time process execution tracking, network
Score 70/100
Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware
Score 70/100
End-to-end encryption (E2EE) ensures that only the communicating parties can read messages, with no intermediary
Score 70/100
Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule
Score 70/100
Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself
Score 70/100
Search all 2,630 Security skills →