Implement security best practices for Lindy AI agents and integrations. Use when securing API keys, configuring agent permissions, verifying webhooks, or auditing agent access.
Score 70/100
Secure API key management, OAuth best practices, and webhook verification for Linear integrations. Trigger: "linear security", "linear API key security", "linear OAuth", "secure…
Score 70/100
Esta skill deve ser usada quando o usuário solicitar candidaturas automáticas em vagas do LinkedIn relacionadas a Inteligência Artificial (IA) no Brasil, priorizando vagas com…
Score 70/100
Esta skill deve ser usada quando o usuário solicitar candidaturas automáticas em vagas do LinkedIn relacionadas a Inteligência Artificial (IA) no Brasil, priorizando vagas com…
Score 70/100
Production patterns for Linkerd service mesh - the lightweight, security-first service mesh for Kubernetes.
Score 70/100
Implement Linkerd service mesh patterns for lightweight, security-focused service mesh deployments. Use when setting up Linkerd, configuring traffic policies, or implementing…
Score 70/100
Run a static policy pass over Kubernetes YAML before misconfigurations, missing limits, or risky defaults reach a cluster.
Score 70/100
Generates .lintstagedrc configuration to automatically fix and format staged files before commit. Runs ESLint, Stylelint, and Prettier on staged files.
Score 70/100
Durcissement sécurité Linux — SSH, fail2ban, SELinux, audit, gestion des utilisateurs et mises à jour.
Score 70/100
Durcissement sécurité Linux — SSH, fail2ban, SELinux, audit, gestion des utilisateurs et mises à jour.
Score 70/100
LiteLLM is an open-source Python SDK and proxy server that provides a unified OpenAI-compatible interface to call 100+ LLM APIs including OpenAI, Anthropic, Azure, Bedrock, and…
Score 70/100
Litestream is a streaming replication tool for SQLite databases that continuously replicates changes to S3, Azure, GCS, SFTP, or local storage.
Score 70/100
Comprehensive live site audit orchestrating performance, accessibility, security, and code quality specialists in parallel.
Score 70/100
DeFi fundamentals and cross-chain analytics using DefiLlama-style data. Use when you want to find undervalued protocols, screen by TVL/revenue growth vs token price, compare…
Score 70/100
LLM is a Python CLI tool and library by Simon Willison for accessing OpenAI, Anthropic Claude, Google Gemini, Meta Llama, and dozens of other language models from the terminal.
Score 70/100
Comprehensive guide to securing LLM applications including prompt injection prevention, jailbreak detection, guardrails, and red teaming methodologies
Score 70/100
中文优先:用于LLMtrading智能体安全相关任务,帮助识别、设计、实现或验证对应工作流。English keywords: Security patterns for autonomous trading agents with wallet or transaction authority.
Score 70/100
Checks hardcoded secrets, SQL injection, XSS, insecure deps, input validation. Use when auditing security.
Score 70/100
Checks outdated packages, unused deps, reinvented wheels, CVE/CVSS vulnerability scan. Use when auditing dependencies.
Score 70/100
Sets up security scanning for secrets and dependency vulnerabilities. Use when adding security infrastructure to a project.
Score 70/100
Scans codebase for hardcoded secrets with severity classification and remediation guidance. Use when auditing a project for leaked credentials.
Score 70/100
Use mbox-to-sqlite when an agent needs to work across an email archive as structured data instead of parsing one message at a time.
Score 70/100
Run constant-rate HTTP attacks, capture binary results, and generate reports or plots before capacity changes and releases.
Score 70/100
Register ICANN domains with crypto payments (USDC/USDT/ETH/BTC) via API — built for AI agents
Score 70/100
Install, configure, and validate local ClickHouse for gapless-crypto-clickhouse development and backtesting.
Score 70/100
Implement centralized logging with ELK Stack, Loki, or Splunk for log collection, parsing, storage, and analysis across infrastructure.
Score 70/100
Analyze application logs to identify errors, performance issues, and security anomalies. Use when debugging issues, monitoring system health, or investigating incidents.
Score 70/100
Log Analysis Security - Auto-activating skill for Security Advanced. Triggers on: log analysis security, log analysis security Part of the Security Advanced skill category.
Score 70/100
Analyze system, application, and security logs for forensic investigation. Use when investigating security incidents, insider threats, system compromises, or any scenario…
Score 70/100
Monitor and log API requests with correlation IDs, performance metrics, and security audit trails. Use when auditing API requests and responses.
Score 70/100
Sweep a directory, module, or full codebase for logic correctness and produce a scored health dashboard with systemic patterns.
Score 70/100
AI-powered Claude Code skill that performs deep code review using formal logic and reasoning frameworks to detect bugs, anti-patterns, and security risks beyond what linters catch.
Score 70/100
Find logic bugs in a single file or function via semi-formal execution tracing (Premises → Trace → Divergence → Remedy).
Score 70/100
Investigate Salesforce login activity using LoginHistory, IdentityVerificationHistory, and Login Forensics (Event Monitoring add-on): reconstruct per-user login timelines,…
Score 70/100
Reproduces the full prefill sensitivity analysis pipeline for reward hacking indicators. Use when evaluating how susceptible model checkpoints are to exploit-eliciting prefills,…
Score 70/100
Apply Lokalise security best practices for API tokens and access control. Use when securing API tokens, implementing least privilege access, or auditing Lokalise security…
Score 70/100
Version 2.35.0 | PRD to Production | Zero Human Intervention > Research-enhanced: OpenAI SDK, DeepMind, Anthropic, AWS Bedrock, Agent SDK, HN Production (2025)
Score 70/100
Fetch current documentation for libraries used in channelhub (Bun, grammy, MCP SDK, Playwright, bun:sqlite, etc.).
Score 70/100
Finds the Network Interface Card (NIC) and associated Network Security Group (NSG) for a VM given its public IP address.
Score 70/100
Checks every subnet in a Virtual Network for an associated Network Security Group, and also inspects each NIC attached to those subnets for NIC-level NSG coverage.
Score 70/100
Use when designing or reviewing Lightning Web Components for DOM safety, Lightning Web Security boundaries, third-party library handling, and secure server-side data access from…
Score 70/100
macOS security hardening for Claude Code — pre-execution validation, malicious config detection, credential hygiene, endpoint protection
Score 70/100
Execute email operations with platform-specific optimizations and security protocols.
Score 70/100
Install and configure MaintainX REST API authentication. Use when setting up a new MaintainX integration, configuring API keys, or initializing MaintainX API access in your…
Score 70/100
Configure MaintainX API security, credential management, and access control. Use when securing API keys, implementing access controls, or hardening your MaintainX integration.
Score 70/100
CRITICAL: Use for Makepad 2.0 event and action handling. Triggers on: makepad event, makepad action, MatchEvent, handle_event, handle_actions, on_click, on_render, on_return,…
Score 70/100
CRITICAL: Use for Makepad 2.0 event and action handling. Triggers on: makepad event, makepad action, MatchEvent, handle_event, handle_actions, on_click, on_render, on_return,…
Score 70/100
Professional malware analysis workflow for PE executables and suspicious files. Triggers on file uploads with requests like "analyze this malware", "analyze this sample", "what…
Score 70/100
Expert malware analyst specializing in defensive malware research, threat intelligence, and incident response.
Score 70/100
Manages the end-to-end cyber threat intelligence lifecycle from planning and direction through collection, processing,
Score 70/100
Execute use when managing Kubernetes network policies and firewall rules. Trigger with phrases like "create network policy", "configure firewall rules", "restrict pod…
Score 70/100
Maps observed adversary behaviors, security alerts, and detection rules to MITRE ATT&CK techniques and sub-techniques
Score 70/100
Markdown sanitization order matters — marked.js then DOMPurify then Mermaid to prevent XSS
Score 70/100
Use when administering a Synapse / Matrix homeserver — list or snapshot all rooms, rate room health (public, unencrypted, orphaned), render a Graphviz map of the room/space tree,…
Score 70/100
Production-ready patterns and best practices for MCP servers - architecture, security, performance, and maintenance
Score 70/100
Comprehensive techniques for acquiring, analyzing, and extracting artifacts from memory dumps for incident response and malware analysis.
Score 70/100
Produce share-safe copies of memory files under /tmp with PII redacted (paths, emails, session IDs, dates) and credentials scanned (tokens, keys); never mutates originals.
Score 70/100
Translates Mermaid sequenceDiagrams describing cryptographic protocols into ProVerif formal verification models (.pv files).
Score 70/100
Plan and operate Salesforce org-wide multi-factor authentication (MFA) enforcement: verification methods, phased rollout, SSO and API-only considerations, exemptions, and…
Score 70/100
Migrate from OpenClaw to NanoClaw. Detects existing OpenClaw installation, extracts identity, channel credentials, scheduled tasks, and other config, then guides interactive…
Score 70/100