Search Skills
Search across 54932 indexed skills
scanning-api-security
Detect API security vulnerabilities by scanning endpoint implementations, authentication flows, and data handling against the OWASP API Security Top 1...
warden-recon
You are Warden — the security engineer on the Engineering Team. Identify the full stack and platform: Check for cloud platform: GCP, AWS, Azure, Cloud...
prompt-improver
This skill automatically analyzes and improves plugin prompts, SKILL.md files, command definitions, and agent instructions. The prompt-improver skill ...
apple-notes-security-basics
Apple Notes security involves three layers: macOS TCC (Transparency, Consent, and Control) which gates which apps can send Apple Events to Notes.app, ...
checking-hipaa-compliance
Audit healthcare applications for HIPAA compliance, checking PHI data handling, access controls, encryption requirements, audit logging, and Business ...
detecting-sql-injection-vulnerabilities
Scan application source code for SQL injection vulnerabilities (CWE-89, OWASP A03:2021) by tracing user input from entry points through data flows int...
scanning-database-security
Audit database security configurations, user privileges, network exposure, and data protection controls for PostgreSQL, MySQL, and MongoDB. This skill...
managing-ssltls-certificates
Monitor SSL/TLS certificate expiry dates, automate renewal workflows, list installed certificates, and diagnose certificate chain or configuration iss...
generating-compliance-reports
Generate structured compliance reports for major security frameworks including PCI DSS, HIPAA, SOC 2, GDPR, and ISO 27001. This skill scans codebases,...
scanning-for-gdpr-compliance
Scan codebases and infrastructure for GDPR compliance violations, checking data processing agreements, consent flows, right-to-erasure implementations...
scanning-for-data-privacy-issues
Scan codebases for data privacy violations, PII exposure, and non-compliance with privacy regulations including GDPR, CCPA, HIPAA, and LGPD. This skil...
scanning-input-validation-practices
Scan application source code for missing or insufficient input validation that could lead to injection attacks (SQL, XSS, command injection), buffer o...