Found 1000 skills for "security" Page 20 of 84

cloud-security

Cloud security posture assessment skill for detecting IAM privilege escalation, public storage exposure, network configuration risks, and infrastructu...

github 3 files

senior-security

Security engineering tools for threat modeling, vulnerability analysis, secure architecture design, and penetration testing. --- Threat Modeling Workf...

github 6 files

skill-security-auditor

Scan and audit AI agent skills for security risks before installation. Produces a clear PASS / WARN / FAIL verdict with findings and remediation guida...

github 3 files

ai-security

AI and LLM security assessment skill for detecting prompt injection, jailbreak vulnerabilities, model inversion risk, data poisoning exposure, and age...

github 3 files

information-security-manager-iso27001

Implement and manage Information Security Management Systems (ISMS) aligned with ISO 27001:2022 and healthcare regulatory requirements. --- Trigger Ph...

github 6 files

skill-security-auditor

This guide covers security auditing workflows for source code, dependencies, and configurations. For detailed vulnerability patterns and detection rul...

github 6 files

owasp-security

Prevent common security vulnerabilities in web applications. | # | Vulnerability | Prevention | |---|---------------|------------| | A01 | Broken Acce...

github 1 files

linux-security-audit

10-point security check for Linux servers. ss -tlnp grep "Failed password" /var/log/auth.log | wc -l grep -Po '^sudo:.$' /etc/group find / -perm -2 -t...

clawhub 3 files

ordercli-security-advisory

Date: 2026-05-07T09:15:31Z Audit of /root/.openclaw/workspace/ordercli found 2 high/critical issues. 🔴 Critical: 0 🟠 High: 2 🟡 Medium: 2 🟡 MEDIUM: Som...

clawhub 3 files

merlin-security-sentinel

Load this skill when the user is concerned about: Credential theft or exfiltration by AI agents Prompt injection attacks via messages, files, or web c...

clawhub 3 files

shieldbot-security

Autonomous transaction firewall for BNB Chain and 6 EVM networks. Scan contracts, simulate transactions before signing, investigate deployers, detect ...

clawhub 10 files

trivy-security-scanner

Run Trivy scans against container images, filesystems, Git repositories, and Infrastructure-as-Code — then apply intelligent triage to cut through vul...

clawhub 3 files