mdskills
← All use cases

Security

Security audits, vulnerability scanning, and compliance

58 listings

Frontend Mobile Security Xss Scan

You are a frontend security specialist focusing on Cross-Site Scripting (XSS) vulnerability detection and prevention. Analyze React, Vue, Angular, and vanilla JavaScript code to identify injection poi

8.01 weeklysickn33/antigravity-awesome-skills

Security Auditor

Expert security auditor specializing in DevSecOps, comprehensive

6.01 weeklysickn33/antigravity-awesome-skills

SQL Injection Testing

This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through injection", "detect SQL injection flaws", or "exploit database query vulnerabilities". It provides comprehensive techniques for identifying, exploiting, and understanding SQL injection attack vectors across different database systems.

8.01 weeklysickn33/antigravity-awesome-skills

Pentest Checklist

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.

8.01 weeklysickn33/antigravity-awesome-skills

Red Team Tools and Methodology

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or needs security researcher techniques and tool configurations from top bug bounty hunters.

8.01 weeklysickn33/antigravity-awesome-skills

Vulnerability Scanner

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

7.01 weeklysickn33/antigravity-awesome-skills

Cross-Site Scripting and HTML Injection Testing

This skill should be used when the user asks to "test for XSS vulnerabilities", "perform cross-site scripting attacks", "identify HTML injection flaws", "exploit client-side injection vulnerabilities", "steal cookies via XSS", or "bypass content security policies". It provides comprehensive techniques for detecting, exploiting, and understanding XSS and HTML injection attack vectors in web applications.

8.01 weeklysickn33/antigravity-awesome-skills

Malware Analyst

Expert malware analyst specializing in defensive malware research,

8.01 weeklysickn33/antigravity-awesome-skills

Solidity Hardhat

Rules

You are an expert in Solidity and smart contract security.

7.0PatrickJS/awesome-cursorrules

Solidity Security

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementing security measures for blockchain applications.

5.0sickn33/antigravity-awesome-skills

Security Scanning Tools

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware", "check cloud security", or "evaluate system compliance". It provides comprehensive guidance on security scanning tools and methodologies.

8.0sickn33/antigravity-awesome-skills

Metasploit Framework

This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities with msfconsole", "create payloads with msfvenom", "perform post-exploitation", "use auxiliary modules for scanning", or "develop custom exploits". It provides comprehensive guidance for leveraging the Metasploit Framework in security assessments.

8.0sickn33/antigravity-awesome-skills

Ethical Hacking Methodology

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit vulnerabilities", or "write penetration test reports". It provides comprehensive ethical hacking methodology and techniques.

7.0sickn33/antigravity-awesome-skills

Lunar

Lunar MCPX is an MCP server which serves as an aggregator for other MCP servers. Its primary goal is to simplify the integration and management of multiple MCP servers dynamically. By using MCPX, developers can easily manage connections to various MCP-compatible services through simple configuration changes, enabling rapid integration with no coding involved. MCPX provides: - Dynamic MCP servers d

7.0TheLunarCompany/lunar

Codebase Cleanup Deps Audit

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing issues, outdated packages, and provide actionable remediation strategies.

7.0sickn33/antigravity-awesome-skills

Xian Smart Contracts Cursor Rules

Rules

Xian Smart Contract Development - Cursor Rules

8.0PatrickJS/awesome-cursorrules

WordPress Penetration Testing

This skill should be used when the user asks to "pentest WordPress sites", "scan WordPress for vulnerabilities", "enumerate WordPress users, themes, or plugins", "exploit WordPress vulnerabilities", or "use WPScan". It provides comprehensive WordPress security assessment methodologies.

8.0sickn33/antigravity-awesome-skills

Broken Authentication Testing

This skill should be used when the user asks to "test for broken authentication vulnerabilities", "assess session management security", "perform credential stuffing tests", "evaluate password policies", "test for session fixation", or "identify authentication bypass flaws". It provides comprehensive techniques for identifying authentication and session management weaknesses in web applications.

9.0sickn33/antigravity-awesome-skills

Kotlin Ktor Development

Rules

Instruction to developer: save this file as .cursorrules and place it on the root project directory

9.0PatrickJS/awesome-cursorrules

Solidity Foundry

Rules

You are an expert in Solidity and smart contract security.

7.0PatrickJS/awesome-cursorrules

API Fuzzing for Bug Bounty

This skill should be used when the user asks to "test API security", "fuzz APIs", "find IDOR vulnerabilities", "test REST API", "test GraphQL", "API penetration testing", "bug bounty API testing", or needs guidance on API security assessment techniques.

8.0sickn33/antigravity-awesome-skills

AWS Penetration Testing

This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata SSRF", "Lambda exploitation", or needs guidance on Amazon Web Services security assessment.

8.0sickn33/antigravity-awesome-skills

Claw Release

Release automation for Claw skills and website. Guides through version bumping, tagging, and release verification.

8.0prompt-security/clawsec

HTML Injection Testing

This skill should be used when the user asks to "test for HTML injection", "inject HTML into web pages", "perform HTML injection attacks", "deface web applications", or "test content injection vulnerabilities". It provides comprehensive HTML injection attack techniques and testing methodologies.

8.0sickn33/antigravity-awesome-skills