Search Skills
Search across 54932 indexed skills
find-bugs
Review changes on this branch for bugs, security vulnerabilities, and code quality issues. You need a review focused on bugs, security issues, or risk...
anti-reversing-techniques
AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis: 1. Verify authorization: Confirm...
red-team-tools
AUTHORIZED USE ONLY: Use this skill only for authorized security assessments, defensive validation, or controlled educational environments. Implement ...
klingai-audit-logging
Compliance-grade audit logging for Kling AI API operations. Every task submission, status change, and credential usage is captured in tamper-evident s...
validator-expert
!gcloud config get-value project 2>/dev/null || echo 'no active project' !gcloud auth list --filter=status:ACTIVE --format="value(account)" 2>/dev/nul...
cursor-prod-checklist
Comprehensive checklist for configuring Cursor IDE for production use. Covers security hardening, project rules, indexing optimization, privacy settin...
webflow-prod-checklist
Complete pre-deployment checklist for Webflow Data API v2 integrations, covering authentication, error handling, rate limits, monitoring, and rollback...
performing-ssl-tls-inspection-configuration
SSL/TLS inspection (also called SSL decryption, HTTPS inspection, or TLS break-and-inspect) intercepts encrypted traffic between clients and servers t...
performing-threat-hunting-with-elastic-siem
Use this skill when: SOC teams need to proactively search for threats not caught by existing detection rules Threat intelligence reports describe new ...
integrating-sast-into-github-actions-pipeline
When development teams need automated code-level vulnerability detection on every pull request When security teams require consistent SAST enforcement...
implementing-rapid7-insightvm-for-scanning
Rapid7 InsightVM (formerly Nexpose) is an enterprise vulnerability management platform that combines on-premises scanning via Security Console and Sca...
implementing-azure-defender-for-cloud
When enabling comprehensive security monitoring across Azure subscriptions When implementing cloud workload protection for VMs, containers, SQL, stora...