ClaudSkillsSecurity › Page 4

Claude Security Skills (Page 4 of 44)

Security auditing, penetration testing, vulnerability scanning, OWASP, cloud security, and compliance skills for Claude Code.

2,612 skills · updated 2026-05-02 · showing 181–240 of 2,612 by quality score

Configure Adobe OAuth credentials and API access across development, staging, and production environments with separate Developer Console projects, secret managers, and…
Score 70/100
Apply Adobe security best practices for OAuth credentials, secret rotation, I/O Events webhook signature verification, and least-privilege scoping.
Score 70/100
Multi-agent debate orchestration for Architecture Decision Records. Automatically triggers on ADR create/edit/delete.
Score 70/100
Specialized reverse engineering analysis workflows for binary analysis, pattern recognition, and vulnerability assessment
Score 70/100
Autonomous DevSecOps & FinOps Guardrails. Orchestrates Gemini 3 Flash to audit Linux Kernel patches, Terraform cost drifts, and K8s compliance.
Score 70/100
Analyze and optimize AGC (Automatic Gain Control) parameters for WaveCap-SDR channels. Use when audio is too quiet, too loud, has pumping artifacts, or when tuning AGC…
Score 70/100
Encrypt and decrypt files with age (FiloSottile/age), a simple, modern encryption tool with small explicit keys, post-quantum support, no config options, and UNIX-style…
Score 70/100
Senior backend engineer specializing in scalable API development and microservices architecture. Builds robust server-side solutions with focus on performance, security, and…
Score 70/100
Expert blockchain developer specializing in smart contract development, DApp architecture, and DeFi protocols.
Score 70/100
Interact with Channel Talk using extracted desktop app or browser credentials - read chats, send messages, search messages, manage groups
Score 70/100
Expert cloud architect specializing in multi-cloud strategies, scalable architectures, and cost-effective solutions.
Score 70/100
Expert database administrator specializing in high-availability systems, performance optimization, and disaster recovery.
Score 70/100
Expert dependency manager specializing in package management, security auditing, and version conflict resolution across multiple ecosystems.
Score 70/100
Desktop application specialist building secure cross-platform solutions. Develops Electron apps with native OS integration, focusing on security, performance, and seamless user…
Score 70/100
Implement hooks for permission control and security in custom agents. Use when adding security controls, blocking dangerous operations, implementing audit trails, or designing…
Score 70/100
MCP Agent Mail - Mail-like coordination layer for multi-agent workflows. Identities, inbox/outbox, file reservations, contact policies, threaded messaging, pre-commit guard, Human…
Score 70/100
Send and receive cryptographically signed messages between AI agents using the Agent Messaging Protocol (AMP).
Score 70/100
Expert network engineer specializing in cloud and hybrid network architectures, security, and performance optimization.
Score 70/100
Deep, excruciating code review. Use anytime to analyze code for correctness, edge cases, security, performance, and design issues. Not tied to baseline—this is pure code analysis.
Score 70/100
Dependency management, updates, and security advisory handling. Use when adding, updating, or auditing project dependencies.
Score 70/100
Expert penetration tester specializing in ethical hacking, vulnerability assessment, and security testing.
Score 70/100
Run agent-adapted STRIDE + access-control analysis on an agent system. Produces a ranked risk list with agentic mitigations (scope / split / filter / gate / review).
Score 70/100
Expert security auditor specializing in comprehensive security assessments, compliance validation, and risk management.
Score 70/100
Expert infrastructure security engineer specializing in DevSecOps, cloud security, and compliance frameworks.
Score 70/100
Sécurisation d'agents IA contre injections, abus et fuites de données. Se déclenche avec "sécurité agent", "agent security", "prompt injection", "jailbreak", "agent abuse",…
Score 70/100
Pre-production security checklist for Agentforce deployments: permission scope, data exposure, authentication, logging.
Score 70/100
Agent skill for v3-security-architect - invoke with $agent-v3-security-architect
Score 70/100
Redact PII before it reaches Agentforce prompts, models, and logs. Trigger keywords: agentforce pii, pii redaction, data masking llm, einstein trust layer, prompt pii filter,…
Score 70/100
Dependency management guidelines for Jarvy - crate selection criteria, feature flag best practices, version management, security auditing with cargo-audit and cargo-deny.
Score 70/100
Security best practices and guidelines for the Jarvy CLI codebase - a cross-platform development environment provisioning tool that executes system commands with elevated…
Score 70/100
Collaborative programming framework for production-ready development. Use when starting features, writing code, handling security/errors, adding comments, discussing requirements,…
Score 70/100
Coinbase AgentKit - Toolkit for enabling AI agents with crypto wallets and onchain capabilities. Use for building autonomous agents that can execute transfers, swaps, DeFi…
Score 70/100
List all secrets. Requires authentication. Use for Agentuity cloud platform operations
Score 70/100
Pull secrets from cloud to local .env file. Requires authentication. Use for Agentuity cloud platform operations
Score 70/100
Push secrets from local .env file to cloud. Requires authentication. Use for Agentuity cloud platform operations
Score 70/100
Author, edit, and lint `governance:` blocks in `*.eval.yaml` files. Use when creating or updating evaluation suites that carry AI-governance metadata (OWASP LLM Top 10, OWASP…
Score 70/100
Aggregate breaking cryptocurrency news from 50+ sources including CoinDesk, CoinTelegraph, The Block, and Decrypt.
Score 70/100
Provides AI consultation workflows, prompt templates, and best practices for multi-model consultation.
Score 70/100
Dual-AI code validation using both Claude and Google Gemini to catch 20% more issues. Validates React Native screens for security vulnerabilities, performance anti-patterns,…
Score 70/100
Generate PNG images using AI (multiple models via OpenRouter including Gemini, FLUX.2, Riverflow, SeedDream, GPT-5 Image, GPT-5.4 Image 2, proxied through Cloudflare AI Gateway…
Score 70/100
Operational skill hub for LLM system architecture, evaluation, deployment, and optimization (modern production standards).
Score 70/100
Production MLOps and ML/LLM/agent security skill for deploying and operating ML systems in production (registry + CI/CD, serving, monitoring/drift, evaluation loops, incident…
Score 70/100
Multi-AI engineering loop orchestrating Claude, Codex, and Gemini for comprehensive validation. USE WHEN (1) mission-critical features requiring multi-perspective validation, (2)…
Score 70/100
Identifying, assessing, and mitigating risks in AI systems including bias, safety, privacy, security, and ethical concerns.
Score 70/100
Use when assessing AI/ML systems for prompt injection, jailbreak vulnerabilities, model inversion risk, data poisoning exposure, or agent tool abuse.
Score 70/100
Enterprise AI security - OWASP LLM Top 10, prompt injection defense, guardrails, PII protection
Score 70/100
MANDATORY verification system that prevents Claude Code instances from making false claims or fabricating evidence.
Score 70/100
MANDATORY verification system that prevents Claude Code instances from making false claims or fabricating evidence.
Score 70/100
AI/ML model security testing and adversarial research capabilities. Generate adversarial examples, test model robustness, perform model extraction attacks, test for data…
Score 70/100
Apply Web3 security best practices for Alchemy-powered applications. Use when securing API keys, validating blockchain inputs, preventing private key exposure, or hardening dApp…
Score 70/100
Analyzes SIEM alert pipelines for rule optimization, alert fatigue reduction, criticality scoring, asset-based prioritization, and correlation rule design using NIST CSF and…
Score 70/100
Execute Algolia production readiness checklist: index settings, key security, replica configuration, monitoring, and rollback procedures.
Score 70/100
Apply Algolia security best practices: API key scoping, secured API keys, frontend vs backend key separation, and key rotation.
Score 70/100
Scans Algorand smart contracts for 11 common vulnerabilities including rekeying attacks, unchecked transaction fees, missing field validations, and access control issues.
Score 70/100
Walk a security team member through allocating a CVE for an tracking issue. Prints the ASF Vulnogram allocation URL and a CVE-ready title (the issue title stripped of…
Score 70/100
Access 20+ years of global financial data: equities, options, forex, crypto, commodities, economic indicators, and 50+ technical indicators.
Score 70/100
Scrapes Amazon product data from ASINs using browseract.com automation API and performs surgical competitive analysis.
Score 70/100
Ad hoc SQL analytics on local parquet, CSV, Excel, JSON, Avro, or SQLite files — auto-triggers on data analysis requests
Score 70/100
Analyse Mitre ATT&CK tactics, techniques and sub-techniques. Use when performing analysis of threat detections, threat models, security risks or cyber threat intelligence
Score 70/100
Network protocol analyzer and packet capture tool for traffic analysis, security investigations, and forensic examination using Wireshark's command-line interface.
Score 70/100
Search all 2,612 Security skills →