Search Skills
Search across 54932 indexed skills
cloud-security
Cloud security posture assessment skill for detecting IAM privilege escalation, public storage exposure, network configuration risks, and infrastructu...
senior-security
Security engineering tools for threat modeling, vulnerability analysis, secure architecture design, and penetration testing. --- Threat Modeling Workf...
skill-security-auditor
Scan and audit AI agent skills for security risks before installation. Produces a clear PASS / WARN / FAIL verdict with findings and remediation guida...
ai-security
AI and LLM security assessment skill for detecting prompt injection, jailbreak vulnerabilities, model inversion risk, data poisoning exposure, and age...
information-security-manager-iso27001
Implement and manage Information Security Management Systems (ISMS) aligned with ISO 27001:2022 and healthcare regulatory requirements. --- Trigger Ph...
skill-security-auditor
This guide covers security auditing workflows for source code, dependencies, and configurations. For detailed vulnerability patterns and detection rul...
owasp-security
Prevent common security vulnerabilities in web applications. | # | Vulnerability | Prevention | |---|---------------|------------| | A01 | Broken Acce...
linux-security-audit
10-point security check for Linux servers. ss -tlnp grep "Failed password" /var/log/auth.log | wc -l grep -Po '^sudo:.$' /etc/group find / -perm -2 -t...
ordercli-security-advisory
Date: 2026-05-07T09:15:31Z Audit of /root/.openclaw/workspace/ordercli found 2 high/critical issues. 🔴 Critical: 0 🟠High: 2 🟡 Medium: 2 🟡 MEDIUM: Som...
merlin-security-sentinel
Load this skill when the user is concerned about: Credential theft or exfiltration by AI agents Prompt injection attacks via messages, files, or web c...
shieldbot-security
Autonomous transaction firewall for BNB Chain and 6 EVM networks. Scan contracts, simulate transactions before signing, investigate deployers, detect ...
trivy-security-scanner
Run Trivy scans against container images, filesystems, Git repositories, and Infrastructure-as-Code — then apply intelligent triage to cut through vul...