Search Skills
Search across 54932 indexed skills
ai-prompt-engineering-safety-review
You are an expert AI prompt engineer and safety specialist with deep expertise in responsible AI development, bias detection, security analysis, and p...
testing-websocket-api-security
Assessing real-time communication APIs that use WebSocket (ws://) or Secure WebSocket (wss://) protocols Testing for Cross-Site WebSocket Hijacking (C...
performing-soap-web-service-security-testing
SOAP (Simple Object Access Protocol) web services remain widely deployed in enterprise environments, financial systems, healthcare, and government int...
performing-plc-firmware-security-analysis
When assessing PLC security as part of an IEC 62443 component security evaluation (IEC 62443-4-2) When validating firmware integrity after a suspected...
performing-bluetooth-security-assessment
This skill covers performing Bluetooth Low Energy (BLE) security assessments using the Python bleak library. BLE devices are ubiquitous in IoT, health...
performing-api-security-testing-with-postman
Building repeatable API security test suites for OWASP API Security Top 10 coverage Creating automated security regression tests that run in CI/CD pip...
implementing-supply-chain-security-with-in-toto
in-toto is a CNCF graduated project that ensures the integrity of software supply chains from initiation to end-user installation. It creates a verifi...
implementing-runtime-security-with-tetragon
Tetragon is a CNCF project under Cilium that provides flexible Kubernetes-aware security observability and runtime enforcement using eBPF. By operatin...
implementing-pod-security-admission-controller
Pod Security Admission (PSA) is a built-in Kubernetes admission controller (stable since v1.25) that enforces Pod Security Standards at the namespace ...
implementing-iec-62443-security-zones
When designing a greenfield OT network architecture for a new industrial facility When retrofitting security zones into an existing flat OT network af...
implementing-kubernetes-pod-security-standards
Pod Security Standards (PSS) define three levels of security policies -- Privileged, Baseline, and Restricted -- enforced by the Pod Security Admissio...
implementing-devsecops-security-scanning
Setting up automated security scanning in a new or existing CI/CD pipeline Shifting security left by catching vulnerabilities before code reaches prod...