SKILL.md files package domain expertise into something any AI agent can use. Drop one into your project and your agent learns how to process PDFs, design interfaces, write tests, or whatever the skill teaches.
83 skills
Security auditor for Laravel applications. Analyzes code for vulnerabilities, misconfigurations, and insecure practices using OWASP standards and Laravel security best practices.
|
Expert security auditor specializing in DevSecOps, comprehensive
Enterprise-grade Chrome automation for AI agents with compliance-ready logging Enterprise Features • Compliance Logging • Security Features • Quick Start • Docker Deploy Built for corporate environments where security, compliance, and auditability are non-negotiable. SIEM-ready logging in industry-standard formats. Every tool execution, credential access, and security event is logged. - authentica
Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementing security measures for blockchain applications.
Orchestrate multiple Antigravity skills through guided workflows for SaaS MVP delivery, security audits, AI agent builds, and browser QA.
Expert reverse engineer specializing in binary analysis,
Use when developing WordPress plugins: architecture and hooks, activation/deactivation/uninstall, admin UI and Settings API, data storage, cron/tasks, security (nonces/capabilities/sanitization/escaping), and release packaging.
Triggers on stock/market analysis, investment research, earnings, valuations, sentiment queries.
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware", "check cloud security", or "evaluate system compliance". It provides comprehensive guidance on security scanning tools and methodologies.
Master effective code review practices to provide constructive feedback, catch bugs early, and foster knowledge sharing while maintaining team morale. Use when reviewing pull requests, establishing review standards, or mentoring developers.
A Claude Code skill that integrates the powerful web fuzzer ffuf (Fuzz Faster U Fool) for web security testing and reconnaissance tasks. This skill enables Claude Code to perform intelligent web fuzzing operations using ffuf, making it easier to discover hidden directories, files, subdomains, and API endpoints. - ffuf must be installed on your system - Claude Desktop application - Appropriate auth
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities, assess risks, and recommend remediation.
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing issues, outdated packages, and provide actionable remediation strategies.
Give AI assistants (Claude, Cursor, VS Code, etc.) the ability to control your desktop and automate tasks across any application. Claude Code (one-liner): Other clients (Cursor, VS Code, Windsurf, etc.): Add to your MCP config file: See the MCP Agent README for detailed setup instructions. - Uses your browser session - no need to relogin, keeps all your cookies and auth - Doesn't take
Skill for creating auth layers in TypeScript/JavaScript apps using Better Auth.
|
Use when you need to address review or issue comments on an open GitHub Pull Request using the gh CLI.
Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture reviews, threat identification, and secure-by-design planning.
Build security Blue Books for sensitive apps
Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.
Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.
MCP server to let LLM take full control on your device by providing screen automation toolkit for controlling and interacting with graphical user interfaces. Good for automation, education and having fun. - 📷 Screen capture and analysis - 🖱️ Mouse control (clicking, positioning) - ⌨️ Keyboard input (typing, key presses, hotkeys) 0. Install python 3.12 1. Clone the repository: 2. create virtiual