Search Skills
Search across 54932 indexed skills
correlating-security-events-in-qradar
Use this skill when: SOC analysts need to investigate QRadar offenses and correlate events across multiple log sources Detection engineers build custo...
triaging-security-alerts-in-splunk
Use this skill when: SOC Tier 1 analysts need to process the Incident Review queue in Splunk Enterprise Security (ES) Notable events require rapid sev...
performing-security-headers-audit
During authorized web application security assessments as a standard configuration review When evaluating browser-level protections against XSS, click...
triaging-security-incident-with-ir-playbook
New security alert received from SIEM, EDR, or other detection sources SOC analyst needs to determine if an alert is a true positive requiring respons...
analyzing-security-logs-with-splunk
Investigating a security incident that requires correlation across multiple log sources Hunting for adversary activity using known TTPs and IOCs Build...
rails-security-review
Use this skill when the task is to review or harden Rails code from a security perspective. Core principle: Prioritize exploitable issues over style. ...
django-security
Comprehensive security guidelines for Django applications to protect against common vulnerabilities. Setting up Django authentication and authorizatio...
azure-security-keyvault-secrets-java
Securely store and manage secrets like passwords, API keys, and connection strings. <dependency> <groupId>com.azure</groupId> <artifactId>azure-securi...
azure-security-keyvault-keys-java
Manage cryptographic keys and perform cryptographic operations in Azure Key Vault and Managed HSM. <dependency> <groupId>com.azure</groupId> <artifact...
azure-security-keyvault-keys-dotnet
Client library for managing cryptographic keys in Azure Key Vault and Managed HSM. dotnet add package Azure.Security.KeyVault.Keys dotnet add package ...
mcp-security-audit
Audit MCP server configurations for security issues — secrets exposure, shell injection, unpinned dependencies, and unapproved servers. MCP servers gi...
jackson-security
Jackson transforms JSON text into Java objects during a single readValue() call. This transformation is not a simple data copy—Jackson interprets JSON...