Search Skills
Search across 54932 indexed skills
ai-data-security
| 阶段 | 攻击类型 | 目标 | |------|---------|------| | 应用层 | System Prompt 泄露、API 信息泄露、PII 窃取 | 配置/接口/用户数据 | | 模型层 | 训练数据推导、成员推断、模型反演 | 训练数据/模型参数 | | 部署层 | RA...
007
Security audit, hardening, threat modeling (STRIDE/PASTA), Red/Blue Team, OWASP checks, code review, incident response, and infrastructure security fo...
cc-skill-security-review
This skill ensures all code follows security best practices and identifies potential vulnerabilities. Implementing authentication or authorization Han...
aws-compliance-checker
Automated compliance validation against industry standards including CIS AWS Foundations, PCI-DSS, HIPAA, and SOC 2. Use this skill when you need to v...
frontend-mobile-security-xss-scan
You are a frontend security specialist focusing on Cross-Site Scripting (XSS) vulnerability detection and prevention. Analyze React, Vue, Angular, and...
differential-review
Security-focused code review for PRs, commits, and diffs. You need a security-focused review of a PR, commit range, or diff rather than a general code...
log-analysis-security
This skill provides automated assistance for log analysis security tasks within the Security Advanced domain. This skill activates automatically when ...
scanning-for-vulnerabilities
Scan codebases, dependencies, and configurations for security vulnerabilities including CVE detection, code-level flaws, and insecure defaults, with s...
validating-cors-policies
Validate Cross-Origin Resource Sharing configurations in web applications and APIs for security misconfigurations that enable unauthorized cross-origi...
checking-owasp-compliance
Assess web applications against the OWASP Top 10, identifying injection flaws, broken authentication, sensitive data exposure, XXE, access control gap...
assisting-with-soc2-audit-preparation
Automate SOC 2 Type I and Type II audit preparation by assessing controls across the five AICPA Trust Service Criteria (Security, Availability, Proces...
validating-authentication-implementations
Validate authentication mechanisms across web applications, APIs, and backend services for security weaknesses, compliance gaps, and implementation fl...