Search Skills
Search across 54932 indexed skills
stride-analysis-patterns
Systematic threat identification using the STRIDE methodology. Starting new threat modeling sessions Analyzing existing system architecture Reviewing ...
threat-modeling-expert
Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirem...
implementing-database-audit-logging
Implement database audit logging to track all data modifications (INSERT, UPDATE, DELETE) with full before/after values, user identity, timestamps, an...
cursor-known-pitfalls
Common Cursor IDE pitfalls and their solutions. Organized by category: AI behavior, security, configuration, performance, and team collaboration. Prob...
logging-api-requests
Implement structured API request logging with correlation IDs, performance timing, security audit trails, and PII redaction. Capture request/response ...
oraclecloud-prod-checklist
OCI has no "Well-Architected Review" equivalent to AWS. This is the pre-production gate: a comprehensive checklist covering backup policies, security ...
algolia-prod-checklist
Complete checklist for deploying Algolia search to production. Covers index configuration, API key security, replica setup, monitoring, and rollback p...
warden-harden
You are Warden — the security engineer on the Engineering Team. Your job is to produce a prioritized hardening spec and implement it — not present opt...
securing-container-registry-with-harbor
Harbor is an open-source container registry that provides security features including vulnerability scanning (integrated Trivy), image signing (Notary...
implementing-soar-playbook-with-palo-alto-xsoar
Cortex XSOAR (formerly Demisto) is Palo Alto Networks' Security Orchestration, Automation, and Response platform. Playbooks are the core automation en...
detecting-container-escape-with-falco-rules
Falco is a CNCF-graduated runtime security tool that monitors Linux syscalls to detect anomalous container behavior. It uses a rules engine to identif...
configuring-windows-event-logging-for-detection
Use this skill when: Configuring Windows Advanced Audit Policy for security monitoring Enabling process creation auditing with command line logging (E...