Search Skills
Search across 54932 indexed skills
security-threat-model
Deliver an actionable AppSec-grade threat model that is specific to the repository or a project path, not a generic checklist. Anchor every architectu...
security-reviewer-formats
This SKILL.md is the entrypoint for the security reviewer format specifications skill. The skill provides shared format templates and data contracts u...
security-review
An AI-powered security scanner that reasons about your codebase the way a human security researcher would — tracing data flows, understanding componen...
security-threat-model
Deliver an actionable AppSec-grade threat model that is specific to the repository or a project path, not a generic checklist. Anchor every architectu...
security-ownership-map
Build a bipartite graph of people and files from git history, then compute ownership risk and export graph artifacts for Neo4j/Gephi. Also build a fil...
security-best-practices
This skill provides a description of how to identify the language and frameworks used by the current context, and then to load information from this s...
security-reviewer
Use this skill after code changes that touch input handling, auth, APIs, data access, uploads, payments, or external integrations. Use this skill when...
security-scan-diff
targetref = $ARGUMENTS If targetref is not provided, ask the user which tag or commit to compare against HEAD. Thoroughly check for malicious code in ...
security-audit
Performs a deep security audit using the Centinela (QA) agent. Before a release to verify security posture After significant code changes that touch a...
security-guardrails
Cross-cutting security layer that defends the mortgage plugin from misuse and manipulation. Protects against prompt injection in documents, conversati...
security-review
Find vulnerabilities before they ship. Do not dismiss a finding without evidence it is unexploitable. Do not commit, log, or surface secrets discovere...
security-review
This skill ensures all code follows security best practices and identifies potential vulnerabilities. Implementing authentication or authorization Han...