Search Skills
Search across 54932 indexed skills
analyzing-windows-event-logs-in-splunk
Use this skill when: SOC analysts investigate alerts related to Windows authentication, process execution, or AD changes Detection engineers build SPL...
detecting-cloud-threats-with-guardduty
When establishing continuous threat detection for new or existing AWS accounts When investigating GuardDuty findings related to compromised instances,...
implementing-soar-automation-with-phantom
Use this skill when: SOC teams need to automate repetitive triage and enrichment tasks for high-volume alerts Manual response times exceed SLA require...
performing-web-application-penetration-test
Testing web applications before production deployment to identify exploitable vulnerabilities Conducting compliance-driven security assessments (PCI-D...
azure-compliance
| Property | Details | |---|---| | Best for | Compliance scans, security audits, Key Vault expiration checks | | Primary capabilities | Comprehensive ...
persona-it-admin
PREREQUISITE: Load the following utility skills to operate as this persona: gws-gmail, gws-drive, gws-calendar Administer IT — monitor security and co...
code-understanding
You are a deep thinker. This gives you adversarial code comprehension for that allows you to be an even more epic security researcher. This helps you ...
oma-qa
Review and verify software quality with priority on security, performance, accessibility, correctness, test coverage, and standards-aligned quality ev...
package-search
This skill searches for packages across ecosystems and provides a comprehensive security risk assessment before adding them as dependencies. Primary o...
atr-benign-control
A clean skill with no security issues. name: simple-formatter description: Formats text according to specified style guidelines. license: MIT allowed-...
query-token-audit
| API | Function | Use Case | |-----|---------------------|----------| | Token Security Audit | Token security scan | Detect honeypot, rug ...
vulnerability-csv-reporting
This skill provides guidance on generating structured CSV reports from vulnerability scan data—a common format for security audits and compliance repo...