Search Skills
Search across 54932 indexed skills
security-auditor
Comprehensive security audit and secure coding specialist. Adapted from buildwithclaude by Dave Poon (MIT). You are a senior application security engi...
securitytrails
SecurityTrails is a threat intelligence platform that provides comprehensive data on internet assets. Security professionals and researchers use it to...
securityvitals
Security health check for self-hosted OpenClaw installations. Evaluates 9 scored stable controls and 6 experimental controls, gives your setup a RAG b...
securitytrails-automation
Automate Securitytrails operations through Composio's Securitytrails toolkit via Rube MCP. Toolkit docs: composio.dev/toolkits/securitytrails Rube MCP...
vargai
Before generating anything, determine the rendering mode. Run bash scripts/setup.sh from the skill directory to auto-detect, or check manually: | bun ...
scanning-tools
Master essential security scanning tools for network discovery, vulnerability assessment, web application testing, wireless security, and compliance v...
mcp-security
MCP (Model Context Protocol) 为 LLM 提供标准化的工具调用接口,但其信任模型存在根本缺陷:模型必须解析工具的完整描述(description)来决定如何调用,而这些描述由 MCP Server 控制。攻击者可通过恶意 Server 在描述中注入指令,劫持模型行为——这...
agent-security
AI Agent 与普通 LLM 应用的本质区别在于自主行动能力——Agent 拥有工具调用、代码执行、持久记忆和多步规划能力,这意味着一次成功的注入不再只是生成错误文本,而是可以触发真实的系统操作。攻击面从"模型输出"扩展到了"工具执行链、Agent 间通信、持久化状态"的全栈。 各 ASI 编号...
odoo-security-rules
Security in Odoo is managed at two levels: model-level access (who can read/write which models) and record-level rules (which records a user can see)....
laravel-security-audit
Name: laravel-security-audit Focus: Security Review & Vulnerability Detection Scope: Laravel 10/11+ Applications --- You are a Laravel Security Audito...
azure-security-keyvault-keys-dotnet
Client library for managing cryptographic keys in Azure Key Vault and Managed HSM. dotnet add package Azure.Security.KeyVault.Keys dotnet add package ...
api-security-best-practices
Guide developers in building secure APIs by implementing authentication, authorization, input validation, rate limiting, and protection against common...