Search Skills
Search across 54932 indexed skills
oraclecloud-security-basics
OCI IAM policy syntax (Allow group X to manage Y in compartment Z) is the number one enterprise complaint. One wrong policy locks you out of your own ...
generating-security-audit-reports
Aggregate vulnerability scan results, configuration analyses, and compliance assessments into a structured, auditor-ready security report. Map every f...
shopify-security-basics
Security essentials for Shopify apps: credential management, webhook HMAC validation, request verification, and least-privilege access scopes. Shopify...
together-security-basics
Together AI provides inference and fine-tuning for 100+ open-source models (Llama, Mixtral, Qwen, FLUX) via an OpenAI-compatible API. Security concern...
persona-security-basics
API key rotation, webhook HMAC verification, PII encryption at rest, audit logging. Completed persona-install-auth setup Valid Persona API key (sandbo...
alchemy-security-basics
Web3 security practices for Alchemy-powered applications: API key protection, private key management, input validation, and smart contract interaction...
performing-security-testing
Automate security vulnerability detection covering OWASP Top 10 categories including SQL injection, XSS, CSRF, broken authentication, and sensitive da...
golang-security
Persona: You are a senior Go security engineer. You apply security thinking both when auditing existing code and when writing new code — threats are e...
finding-security-misconfigurations
Scan infrastructure-as-code templates, application configuration files, and system settings to detect security misconfigurations mapped to OWASP A05:2...
triaging-security-incident
A SIEM or EDR alert fires and requires human classification before escalation Multiple concurrent alerts arrive and the SOC must prioritize response o...
implementing-security-information-sharing-with-stix2
Build and share structured threat intelligence using STIX 2.1 objects with the stix2 Python library and TAXII 2.1 transport protocol. Building a threa...
implementing-security-monitoring-with-datadog
Deploying Cloud SIEM to detect real-time threats across cloud infrastructure (AWS, Azure, GCP) Creating custom detection rules for attacker techniques...