ClaudSkillsSecurity › Page 29

Claude Security Skills (Page 29 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,630 skills · updated 2026-05-03 · showing 1681–1740 of 2,630 by quality score

Implement security best practices for Lindy AI agents and integrations. Use when securing API keys, configuring agent permissions, verifying webhooks, or auditing agent access.
Score 70/100
Secure API key management, OAuth best practices, and webhook verification for Linear integrations. Trigger: "linear security", "linear API key security", "linear OAuth", "secure…
Score 70/100
Esta skill deve ser usada quando o usuário solicitar candidaturas automáticas em vagas do LinkedIn relacionadas a Inteligência Artificial (IA) no Brasil, priorizando vagas com…
Score 70/100
Esta skill deve ser usada quando o usuário solicitar candidaturas automáticas em vagas do LinkedIn relacionadas a Inteligência Artificial (IA) no Brasil, priorizando vagas com…
Score 70/100
Production patterns for Linkerd service mesh - the lightweight, security-first service mesh for Kubernetes.
Score 70/100
Implement Linkerd service mesh patterns for lightweight, security-focused service mesh deployments. Use when setting up Linkerd, configuring traffic policies, or implementing…
Score 70/100
Run a static policy pass over Kubernetes YAML before misconfigurations, missing limits, or risky defaults reach a cluster.
Score 70/100
Generates .lintstagedrc configuration to automatically fix and format staged files before commit. Runs ESLint, Stylelint, and Prettier on staged files.
Score 70/100
Durcissement sécurité Linux — SSH, fail2ban, SELinux, audit, gestion des utilisateurs et mises à jour.
Score 70/100
Durcissement sécurité Linux — SSH, fail2ban, SELinux, audit, gestion des utilisateurs et mises à jour.
Score 70/100
LiteLLM is an open-source Python SDK and proxy server that provides a unified OpenAI-compatible interface to call 100+ LLM APIs including OpenAI, Anthropic, Azure, Bedrock, and…
Score 70/100
Litestream is a streaming replication tool for SQLite databases that continuously replicates changes to S3, Azure, GCS, SFTP, or local storage.
Score 70/100
Comprehensive live site audit orchestrating performance, accessibility, security, and code quality specialists in parallel.
Score 70/100
DeFi fundamentals and cross-chain analytics using DefiLlama-style data. Use when you want to find undervalued protocols, screen by TVL/revenue growth vs token price, compare…
Score 70/100
LLM is a Python CLI tool and library by Simon Willison for accessing OpenAI, Anthropic Claude, Google Gemini, Meta Llama, and dozens of other language models from the terminal.
Score 70/100
Comprehensive guide to securing LLM applications including prompt injection prevention, jailbreak detection, guardrails, and red teaming methodologies
Score 70/100
中文优先:用于LLMtrading智能体安全相关任务,帮助识别、设计、实现或验证对应工作流。English keywords: Security patterns for autonomous trading agents with wallet or transaction authority.
Score 70/100
Checks hardcoded secrets, SQL injection, XSS, insecure deps, input validation. Use when auditing security.
Score 70/100
Checks outdated packages, unused deps, reinvented wheels, CVE/CVSS vulnerability scan. Use when auditing dependencies.
Score 70/100
Sets up security scanning for secrets and dependency vulnerabilities. Use when adding security infrastructure to a project.
Score 70/100
Scans codebase for hardcoded secrets with severity classification and remediation guidance. Use when auditing a project for leaked credentials.
Score 70/100
Use mbox-to-sqlite when an agent needs to work across an email archive as structured data instead of parsing one message at a time.
Score 70/100
Run constant-rate HTTP attacks, capture binary results, and generate reports or plots before capacity changes and releases.
Score 70/100
Register ICANN domains with crypto payments (USDC/USDT/ETH/BTC) via API — built for AI agents
Score 70/100
Install, configure, and validate local ClickHouse for gapless-crypto-clickhouse development and backtesting.
Score 70/100
Implement centralized logging with ELK Stack, Loki, or Splunk for log collection, parsing, storage, and analysis across infrastructure.
Score 70/100
Analyze application logs to identify errors, performance issues, and security anomalies. Use when debugging issues, monitoring system health, or investigating incidents.
Score 70/100
Log Analysis Security - Auto-activating skill for Security Advanced. Triggers on: log analysis security, log analysis security Part of the Security Advanced skill category.
Score 70/100
Analyze system, application, and security logs for forensic investigation. Use when investigating security incidents, insider threats, system compromises, or any scenario…
Score 70/100
Monitor and log API requests with correlation IDs, performance metrics, and security audit trails. Use when auditing API requests and responses.
Score 70/100
Sweep a directory, module, or full codebase for logic correctness and produce a scored health dashboard with systemic patterns.
Score 70/100
AI-powered Claude Code skill that performs deep code review using formal logic and reasoning frameworks to detect bugs, anti-patterns, and security risks beyond what linters catch.
Score 70/100
Find logic bugs in a single file or function via semi-formal execution tracing (Premises → Trace → Divergence → Remedy).
Score 70/100
Investigate Salesforce login activity using LoginHistory, IdentityVerificationHistory, and Login Forensics (Event Monitoring add-on): reconstruct per-user login timelines,…
Score 70/100
Reproduces the full prefill sensitivity analysis pipeline for reward hacking indicators. Use when evaluating how susceptible model checkpoints are to exploit-eliciting prefills,…
Score 70/100
Apply Lokalise security best practices for API tokens and access control. Use when securing API tokens, implementing least privilege access, or auditing Lokalise security…
Score 70/100
Version 2.35.0 | PRD to Production | Zero Human Intervention > Research-enhanced: OpenAI SDK, DeepMind, Anthropic, AWS Bedrock, Agent SDK, HN Production (2025)
Score 70/100
Fetch current documentation for libraries used in channelhub (Bun, grammy, MCP SDK, Playwright, bun:sqlite, etc.).
Score 70/100
Finds the Network Interface Card (NIC) and associated Network Security Group (NSG) for a VM given its public IP address.
Score 70/100
Checks every subnet in a Virtual Network for an associated Network Security Group, and also inspects each NIC attached to those subnets for NIC-level NSG coverage.
Score 70/100
Use when designing or reviewing Lightning Web Components for DOM safety, Lightning Web Security boundaries, third-party library handling, and secure server-side data access from…
Score 70/100
macOS security hardening for Claude Code — pre-execution validation, malicious config detection, credential hygiene, endpoint protection
Score 70/100
Execute email operations with platform-specific optimizations and security protocols.
Score 70/100
Install and configure MaintainX REST API authentication. Use when setting up a new MaintainX integration, configuring API keys, or initializing MaintainX API access in your…
Score 70/100
Configure MaintainX API security, credential management, and access control. Use when securing API keys, implementing access controls, or hardening your MaintainX integration.
Score 70/100
CRITICAL: Use for Makepad 2.0 event and action handling. Triggers on: makepad event, makepad action, MatchEvent, handle_event, handle_actions, on_click, on_render, on_return,…
Score 70/100
CRITICAL: Use for Makepad 2.0 event and action handling. Triggers on: makepad event, makepad action, MatchEvent, handle_event, handle_actions, on_click, on_render, on_return,…
Score 70/100
Professional malware analysis workflow for PE executables and suspicious files. Triggers on file uploads with requests like "analyze this malware", "analyze this sample", "what…
Score 70/100
Expert malware analyst specializing in defensive malware research, threat intelligence, and incident response.
Score 70/100
Manages the end-to-end cyber threat intelligence lifecycle from planning and direction through collection, processing,
Score 70/100
Execute use when managing Kubernetes network policies and firewall rules. Trigger with phrases like "create network policy", "configure firewall rules", "restrict pod…
Score 70/100
Maps observed adversary behaviors, security alerts, and detection rules to MITRE ATT&CK techniques and sub-techniques
Score 70/100
Markdown sanitization order matters — marked.js then DOMPurify then Mermaid to prevent XSS
Score 70/100
Use when administering a Synapse / Matrix homeserver — list or snapshot all rooms, rate room health (public, unencrypted, orphaned), render a Graphviz map of the room/space tree,…
Score 70/100
Production-ready patterns and best practices for MCP servers - architecture, security, performance, and maintenance
Score 70/100
Comprehensive techniques for acquiring, analyzing, and extracting artifacts from memory dumps for incident response and malware analysis.
Score 70/100
Produce share-safe copies of memory files under /tmp with PII redacted (paths, emails, session IDs, dates) and credentials scanned (tokens, keys); never mutates originals.
Score 70/100
Translates Mermaid sequenceDiagrams describing cryptographic protocols into ProVerif formal verification models (.pv files).
Score 70/100
Plan and operate Salesforce org-wide multi-factor authentication (MFA) enforcement: verification methods, phased rollout, SSO and API-only considerations, exemptions, and…
Score 70/100
Migrate from OpenClaw to NanoClaw. Detects existing OpenClaw installation, extracts identity, channel credentials, scheduled tasks, and other config, then guides interactive…
Score 70/100
Search all 2,630 Security skills →