Search Skills
Search across 54932 indexed skills
ssh-penetration-testing
AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments. Conduct co...
burp-suite-testing
AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments. Execute co...
pci-compliance
Master PCI DSS (Payment Card Industry Data Security Standard) compliance for secure payment processing and handling of cardholder data. The task is un...
aws-iam-best-practices
Review and harden IAM policies following AWS security best practices and least privilege principles. Use this skill when you need to review IAM polici...
dependency-management-deps-audit
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependenci...
plugin-auditor
Automatically audits Claude Code plugins for security vulnerabilities, best practice violations, CLAUDE.md compliance, and quality standards - optimiz...
data-privacy-scanner
This skill automates the process of identifying data privacy risks within a codebase. By leveraging the data-privacy-scanner plugin, Claude can quickl...
compliance-report-generator
This skill empowers Claude to create detailed compliance reports, saving time and ensuring accuracy in documenting security practices. It automates th...
cors-policy-validator
This skill empowers Claude to assess the security and correctness of CORS policies. By leveraging the cors-policy-validator plugin, it identifies misc...
soc2-audit-helper
This skill empowers Claude to assist users in preparing for a SOC2 audit. It automates the process of gathering evidence, analyzing security controls,...
xss-vulnerability-scanner
This skill empowers Claude to proactively identify and report XSS vulnerabilities within your codebase. By leveraging advanced detection techniques, i...
secret-scanner
This skill enables Claude to scan your codebase for exposed secrets, API keys, passwords, and other sensitive credentials. It helps you identify and r...