OpenStack security operations skill for hardening, certificate management, and security posture assessment of cloud infrastructure.
Score 70/100
Scans email threads for security alert signals — phishing reports, suspicious login notifications, data breach mentions, policy violation flags, vulnerability disclosures, and any…
Score 70/100
Comprehensive security vulnerability analysis for codebases and infrastructure. Scans dependencies (npm, pip, gem, go, cargo), containers (Docker, Kubernetes), cloud IaC…
Score 70/100
Hardens code against vulnerabilities. Use when handling user input, authentication, data storage, or external integrations.
Score 70/100
Durcissement de la sécurité des APIs — rate limiting, validation d'entrée, headers de sécurité, CORS, protection contre les attaques courantes.
Score 70/100
Use when conducting a dedicated security architecture review of a Salesforce org — assessing sharing model completeness, FLS/CRUD enforcement, Apex security patterns, exposed API…
Score 70/100
Security payloads, bypass tables, wordlists, gf pattern names, always-rejected bug list, and conditionally-valid-with-chain table.
Score 70/100
Comprehensive security auditing workflow covering web application testing, API security, penetration testing, vulnerability scanning, and security hardening.
Score 70/100
Automatisation d'audits de sécurité incluant scanning, reporting, intégration CI/CD et remediation tracking.
Score 70/100
Security audit methodology and checklist for codebases. Use when performing security reviews, auditing a project for vulnerabilities, or hardening an application before…
Score 70/100
Expert security auditor specializing in DevSecOps, comprehensive cybersecurity, and compliance frameworks.
Score 70/100
Security Benchmark Runner - Auto-activating skill for Security Advanced. Triggers on: security benchmark runner, security benchmark runner Part of the Security Advanced skill…
Score 70/100
Implement security best practices for web applications and infrastructure. Use when securing APIs, preventing common vulnerabilities, or implementing security policies.
Score 70/100
Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope,…
Score 70/100
中文优先:用于安全bountyhunter相关任务,帮助识别、设计、实现或验证对应工作流。English keywords: Hunt for exploitable, bounty-worthy security issues in repositories.
Score 70/100
Comprehensive AI-powered security scanning suite with 48 skills covering OWASP Top 10, 7 language-specific deep scanners (Go, TypeScript, Python, PHP, Rust, Java, C#), supply…
Score 70/100
OWASP-based security checklist any agent can reference when reviewing or writing code
Score 70/100
Guides security professionals in implementing defense-in-depth security architectures, achieving compliance with industry frameworks (SOC2, ISO27001, GDPR, HIPAA), conducting…
Score 70/100
Vérification de conformité sécurité incluant ISO 27001, SOC 2, HIPAA, NIST et audit trail. Se déclenche avec "ISO 27001", "SOC 2", "HIPAA", "NIST", "conformité sécurité", "audit…
Score 70/100
You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards.
Score 70/100
Performs advanced SAST (Static Application Security Testing) and compliance analysis on Pull Request diffs.
Score 70/100
Audit de sécurité des dépendances — détection de vulnérabilités connues, mises à jour critiques et gestion du cycle de vie des packages.
Score 70/100
SEOcrawler security vulnerability scanner and hardening specialist for comprehensive security audits.
Score 70/100
Auto-invoke when reviewing authentication, authorization, input handling, data exposure, or any user-facing code. Enforces OWASP top 10 awareness and security-first thinking.
Score 70/100
Verify security considerations were addressed before shipping. Issues result in WARNINGS that strongly recommend fixing.
Score 70/100
Security Group Generator - Auto-activating skill for AWS Skills. Triggers on: security group generator, security group generator Part of the AWS Skills skill category.
Score 70/100
Expert en sécurité applicative pour détecter les vulnérabilités, auditer le code, et guider les bonnes pratiques de sécurité.
Score 70/100
Adversarial defense layer for the mortgage plugin — protects against prompt injection, system prompt extraction, PII leakage, workflow bypass, and social engineering attacks.
Score 70/100
Sécurisation d'agents IA contre injections, abus et fuites de données. Se déclenche avec "sécurité agent", "agent security", "prompt injection", "jailbreak", "agent abuse",…
Score 70/100
AIDefence security layer with prompt injection blocking, input validation, sandboxed execution, output sanitization, and STRIDE threat modeling.
Score 70/100
Security headers and hardening for Next.js — CSP, CORS, rate limiting, CSRF protection, input sanitization, secrets management.
Score 70/100
Security Headers Generator - Auto-activating skill for Security Fundamentals. Triggers on: security headers generator, security headers generator Part of the Security Fundamentals…
Score 70/100
Use when running, interpreting, or acting on Salesforce Security Health Check results — reading the score, understanding risk categories, evaluating specific settings, creating or…
Score 70/100
When to use: active or suspected Salesforce org compromise, unauthorized access investigation, attacker containment, forensic evidence collection from EventLogFile/LoginHistory,…
Score 70/100
Plan de réponse aux incidents de sécurité — préparation, détection, containment, éradication, recovery et lessons learned.
Score 70/100
Manage security policies, firewall zones, access control rules (ACLs), and guest network access. Perform comprehensive security audits and compliance reviews.
Score 70/100
Automate security monitoring, threat detection, incident response, and compliance workflows
Score 70/100
Monitor social platforms for security threats, vulnerability discussions, and breach intelligence using Xpoz.
Score 70/100
Analyze git repositories to build a security ownership topology (people-to-file), compute bus factor and sensitive-code ownership, and export CSV/JSON for graph databases and…
Score 70/100
Security patterns and OWASP guidelines. Triggers on: security review, OWASP, XSS, SQL injection, CSRF, authentication, authorization, secrets management, input validation, secure…
Score 70/100
Use when the user asks to perform security audits, penetration testing, vulnerability scanning, OWASP Top 10 checks, or offensive security assessments.
Score 70/100
Plans security penetration tests for web applications. Analyzes codebase, API routes, auth implementation, and infrastructure config to generate comprehensive pentest plans.
Score 70/100
Automated PII detection and redaction for client data protection. Scans outputs, logs, artifacts, and communications for sensitive data before external exposure.
Score 70/100
Security Policy Generator - Auto-activating skill for Security Advanced. Triggers on: security policy generator, security policy generator Part of the Security Advanced skill…
Score 70/100
Generate security assessment reports in docx format with findings, risk ratings, and remediation recommendations.
Score 70/100
Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building…
Score 70/100
Security vulnerability assessment identifying OWASP risks, injection vectors, authentication issues, and data exposure with severity classification.
Score 70/100
Perform language and framework specific security best-practice reviews and suggest improvements. Trigger only when the user explicitly requests security best practices guidance, a…
Score 70/100
Identifies security vulnerabilities, generates structured audit reports with severity ratings, and provides actionable remediation guidance.
Score 70/100
Isolated analysis environment management for malware and exploit testing. Create and manage isolated VMs, configure Cuckoo Sandbox, set up REMnux/FlareVM environments, manage…
Score 70/100
Scan the codebase for security vulnerabilities based on the OWASP Top 10. Use when the user asks to audit security, find vulnerabilities, check for security issues, or says…
Score 70/100
AgentShield security audit with 5 scanning categories, 102 static analysis rules, and optional red-team simulation.
Score 70/100
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security.
Score 70/100
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Score 70/100
Automatisation d'audits de sécurité incluant scanning, reporting, intégration CI/CD et remediation tracking.
Score 70/100
Use when working with authentication, API routes, user input, or sensitive data. Audits code for security vulnerabilities based on OWASP Top 10.
Score 70/100
Guide pour analyste SOC — triage d'alertes, investigation, SIEM, indicateurs de compromission et playbooks de réponse.
Score 70/100
Run composable security analysis across binaries, prompts, traces, and policies.
Score 70/100
Repository-grounded threat modeling that enumerates trust boundaries, assets, attacker capabilities, abuse paths, and mitigations, and writes a concise Markdown threat model.
Score 70/100
Analyze codebase architecture to generate a STRIDE-based threat model with data flow diagrams, trust boundaries, prioritized threats, and mitigations.
Score 70/100