ClaudSkillsSecurity › Page 28

Claude Security Skills (Page 28 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,630 skills · updated 2026-05-03 · showing 1621–1680 of 2,630 by quality score

jrnl is a command-line journal application that lets you capture thoughts and notes without leaving the terminal.
Score 70/100
Centralized JSON validation for AGENT_SUCCESS_CRITERIA with defensive parsing and injection attack prevention (CVSS 8.2)
Score 70/100
Apply Juicebox security best practices. Trigger: "juicebox security", "juicebox api key security".
Score 70/100
Security management for Hostinger VPS srv759970 - Fail2ban, WordPress security audits (25+ checks, 0-100% scoring), infrastructure audit.
Score 70/100
Coleta e consulta dados de leiloeiros oficiais de todas as 27 Juntas Comerciais do Brasil. Scraper multi-UF, banco SQLite, API FastAPI e exportacao CSV/JSON.
Score 70/100
Level 2 patterns - vulns, lic, sbom, doctor (security, compliance, environment health)
Score 70/100
Audit JWT implementation for algorithm confusion, secret weakness, claim validation issues, and token handling vulnerabilities. Use when reviewing authentication systems using JWT.
Score 70/100
Comprehensive JWT authentication expert for senior developers (10+ years experience). Intelligently detects project language/framework and implements production-ready JWT auth…
Score 70/100
Guidelines for implementing JWT authentication with security best practices for token creation, validation, and storage
Score 70/100
Jwt Token Validator - Auto-activating skill for Security Fundamentals. Triggers on: jwt token validator, jwt token validator Part of the Security Fundamentals skill category.
Score 70/100
Comprehensive guide for implementing NetworkPolicy, PodSecurityPolicy, RBAC, and Pod Security Standards in Kubernetes.
Score 70/100
Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security.
Score 70/100
Comprehensive Kargo GitOps continuous promotion platform skill. Use when implementing progressive delivery pipelines, promotion workflows, freight management, ArgoCD integration,…
Score 70/100
Katana by ProjectDiscovery is a fast, configurable web crawling and spidering framework written in Go.
Score 70/100
Safety guardrails for autonomous agents. Intercepts destructive actions and vets skills, requires structured approval before irreversible operations, with CLI-backed cryptographic…
Score 70/100
Key Rotation Manager - Auto-activating skill for Security Advanced. Triggers on: key rotation manager, key rotation manager Part of the Security Advanced skill category.
Score 70/100
Use when creating FastAPI endpoints, implementing JWT authentication, handling encrypted payloads, adding audit logging, or applying OWASP security patterns to KeyArc API…
Score 70/100
Use when implementing signup flow, login flow, team sharing, key derivation with Argon2, AES encryption operations, or RSA/ECC key management for KeyArc cryptographic workflows.
Score 70/100
Use when implementing client-side encryption, master key derivation, vault key management, secret storage, or any cryptographic operation for KeyArc.
Score 70/100
Provides comprehensive KeyCloak administration guidance including realm management, user/group administration, client configuration, authentication flows, identity brokering,…
Score 70/100
OpenStack Keystone identity service skill for deploying, configuring, operating, and troubleshooting the authentication and authorization backbone of an OpenStack cloud.
Score 70/100
Expert children's book writer creating delightful, engaging books for ages 2-9. Specializes in rhyming books, stories, songs with proper values, educational content, and…
Score 70/100
Genera contenuti didattici interattivi per bambini di 10 anni su qualsiasi argomento. Include spiegazioni semplici, quiz, esperimenti, attività pratiche e prompt per immagini AI.
Score 70/100
Secures Kirby sites with access restriction, user roles, permissions, and protected downloads. Use when implementing login/role-based access, permissions, or file protection.
Score 70/100
Bereid een klantinterview voor met gestructureerd script, doorvraagtechnieken en FORCES-analyse. Volgt The Mom Test — geen sturende vragen, focus op echt gedrag.
Score 70/100
Apply Klaviyo security best practices for API key management and access control. Use when securing API keys, configuring OAuth scopes, implementing webhook signature verification,…
Score 70/100
Implement audit logging for Kling AI operations for compliance and security. Use when tracking API usage or preparing for audits.
Score 70/100
Security and compliance review framework for Kling AI integrations. Use when preparing for audits or reviewing security posture.
Score 70/100
Run Knip to find and remove unused files, dependencies, and exports in JavaScript and TypeScript projects. Reduces bundle size, maintenance burden, and dependency attack surface.
Score 70/100
Performs intelligent compliance audits for software projects. Automatically detects which regulatory frameworks (GDPR, HIPAA, PCI-DSS, CCPA, SOC 2) apply based on project analysis…
Score 70/100
KrakenD is an ultra-high performance, stateless, declarative API Gateway written in Go. It helps adopt microservices architecture with content aggregation, rate limiting, security…
Score 70/100
Generates comprehensive table-driven tests for go-kratos microservices using testify/mock and testify/assert.
Score 70/100
Kubernetes security policies, RBAC, and Pod Security Standards for hardened cluster deployments. Use when implementing cluster security, defining network policies, or enforcing…
Score 70/100
Performs an uncompromising L5 Enterprise Red Team Audit on a given plugin against the 39-point architectural maturity matrix.
Score 70/100
Design systems using Butler Lampson's principles of abstraction, interfaces, and practical wisdom. Emphasizes clean abstractions, security foundations, and time-tested design…
Score 70/100
The Lancet figure preparation: resolution (300+ DPI at 120%), preferred editable formats (PowerPoint/Word/SVG), column widths (75/154 mm), Times New Roman, in-house redraw policy.
Score 70/100
Install and configure LangChain SDK with provider authentication. Use when setting up a new LangChain project, configuring API keys for OpenAI/Anthropic/Google, or initializing…
Score 70/100
Apply LangChain security best practices for production LLM apps. Use when securing API keys, preventing prompt injection, sandboxing tool execution, or validating LLM outputs.
Score 70/100
Implement Langfuse security best practices for API keys and data privacy. Use when securing Langfuse integration, protecting API keys, or implementing data privacy controls for…
Score 70/100
Laravel security best practices for authn/authz, validation, CSRF, mass assignment, file uploads, secrets, rate limiting, and secure deployment.
Score 70/100
Security auditor for Laravel applications. Analyzes code for vulnerabilities, misconfigurations, and insecure practices using OWASP standards and Laravel security best practices.
Score 70/100
Propose, configure, debug, and maintain Claude Code hooks (PreToolUse/PostToolUse/Stop and other lifecycle events).
Score 70/100
Multi-agent distributed context preservation protocol using cryptographic sharding, gossip propagation, and Byzantine fault tolerance to maintain coherent shared memory across…
Score 70/100
Run a full pre-launch quality gate before shipping — chains product review, growth audit, UX audit, security scan, and deployment preflight into a go/no-go launch decision.
Score 70/100
End-to-end pre-flight checklist for launching a Solana token/app: infra, wallets, liquidity, comms, security, and rollback planning. Use before mainnet launch or major release.
Score 70/100
Comprehensive legacy codebase analysis skill for technical debt assessment, security vulnerability scanning, performance bottleneck detection, and modernization roadmap…
Score 70/100
Audit e-discovery and litigation document review systems -- data collection pipelines (PST, MBOX, SharePoint, Slack), document processing (OCR via Tesseract/ABBYY, metadata…
Score 70/100
Adversarial verification for AI-generated legal content. Use when fact-checking legal documents, validating citations, detecting hallucinations, scoring document quality, or…
Score 70/100
Coordinates 9 specialized audit workers (security, build, architecture, code quality, dependencies, dead code, observability, concurrency, lifecycle).
Score 70/100
Security audit worker (L3). Scans codebase for hardcoded secrets, SQL injection, XSS, insecure dependencies, missing input validation.
Score 70/100
Coordinates security scanning (secrets + deps). Delegates to ln-761/ln-762. Generates SECURITY.md, pre-commit hooks, CI workflow.
Score 70/100
Scans codebase for hardcoded secrets. Returns normalized findings with severity and remediation guidance. Pre-commit hook integration.
Score 70/100
Audits project dependencies for vulnerabilities. Multi-ecosystem support (npm, .NET, Python, Go). CVSS-based severity classification.
Score 70/100
Standardized library design patterns for autonomous-dev including two-tier design, progressive enhancement, non-blocking enhancements, and security-first architecture.
Score 70/100
libsecret - Secret generation and environment utilities. generateSecret creates cryptographic random secrets. generateSecretB64 creates base64url secrets.
Score 70/100
libvips is a demand-driven, horizontally threaded image processing library with over 300 operations. It processes images faster and with less memory than alternatives like…
Score 70/100
License Compliance Scanner - Auto-activating skill for Security Fundamentals. Triggers on: license compliance scanner, license compliance scanner Part of the Security Fundamentals…
Score 70/100
Path-grounded multi-agent orchestration using the Liku directory hierarchy (skills.xml inheritance, todo.md + LikuErrors.md audit trail, SQLite memory).
Score 70/100
Configure enterprise role-based access control for Lindy AI workspaces. Use when setting up team permissions, managing workspace access, or implementing enterprise security…
Score 70/100
Advanced migration strategies for moving to Lindy AI from other platforms. Use when migrating from Zapier, Make, n8n, custom automations, or consolidating fragmented agent…
Score 70/100
Search all 2,630 Security skills →