Back to categories
Category

Agent Skills in category: security

23 skills match this category. Browse curated collections and explore related Agent Skills.

auto-updates

Configure automatic security updates on Ubuntu/Debian VPS servers to patch vulnerabilities and prevent exploitation of known security flaws.

secure-server-skill
secure-server-skill
41

ssh-hardening

Harden SSH configuration on VPS servers by disabling root login, enforcing SSH key authentication, and creating non-root sudo users to prevent unauthorized access.

secure-server-skill
secure-server-skill
41

firewall-configuration

Configure UFW (Uncomplicated Firewall) on Ubuntu/Debian VPS servers to restrict network access and minimize attack surface by controlling inbound and outbound traffic.

secure-server-skill
secure-server-skill
41

fail2ban-setup

Install and configure fail2ban on VPS servers to automatically ban IP addresses that show malicious signs like too many password failures, seeking exploits, or brute-force attacks.

secure-server-skill
secure-server-skill
41

doro-git-secrets-scanner

Git 安全扫描器 - 检查提交中的敏感信息泄露(API keys、密码、token)

["security""git""secrets""scanner"
openclaw
openclaw
3,7881,049

fix-vulnerabilities

>

bitsoex
bitsoex
3730

waf-bypass-hunter

Bypass a Coraza WAF protecting a vulnerable Next.js 16 backend. Analyze parser differentials between Go (WAF) and Node.js (backend) to find bypasses.

hacktron
hacktron
9411

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

hacktron
hacktron
9411

doro-git-secrets-scanner

Git 安全扫描器 - 检查提交中的敏感信息泄露(API keys、密码、token)

["security""git""secrets""scanner"
clawdbot
clawdbot
3,332953

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

hacktron
hacktron
8610

waf-bypass-hunter

Bypass a Coraza WAF protecting a vulnerable Next.js 16 backend. Analyze parser differentials between Go (WAF) and Node.js (backend) to find bypasses.

hacktron
hacktron
8610

secrets-management

Enterprise secrets management across platforms. Manage secrets with HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, and Kubernetes secrets. Configure rotation, policies, and access controls.

babysitter-sdk
babysitter-sdk
244

security-practices

Secure coding with Claude Code - vulnerability prevention, secrets, security review

secure-codingvulnerability-preventionsecurity-reviewsecrets-management
hgeldenhuys
hgeldenhuys
0

permission-patterns

Guide for configuring Claude Code permissions effectively. Use when setting up security policies, configuring allow/deny patterns, managing tool permissions, or implementing team security standards. Covers permission modes, sandboxing, and settings.json configuration.

permissionsrbacsandboxingsecurity-policies
hgeldenhuys
hgeldenhuys
0

zero-trust

Identify and remediate Zero Trust security gaps in Cloudflare deployments. Use this skill when auditing Access policies, checking staging/dev environment protection, detecting unprotected admin routes, or implementing mTLS and service tokens for machine-to-machine auth.

zero-trustcloudflareaccess-controlmTLS
littlebearapps
littlebearapps
0

guardian

Proactively audit Cloudflare configurations for security vulnerabilities, resilience gaps, cost traps, AND budget/privacy risks. Use this skill when reviewing wrangler configs, before deployments, investigating issues, or when ANY architecture decision involves Durable Objects, R2, Workers AI, or high-volume operations. This skill PROACTIVELY warns about cost impacts before users ask.

cloudflarecost-optimizationrisk-managementdurable-objects
littlebearapps
littlebearapps
0

ffuf-web-fuzzing

Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis

ffufweb-fuzzingpenetration-testingauthenticated-fuzzing
prof-ramos
prof-ramos
0

owasp-top-10

OWASP Top 10 web application security risks with detection patterns and fixes. Use when reviewing security vulnerabilities, authentication, authorization, or data handling.

OWASPweb-application-securityvulnerability-detectionauthentication
MylesMCook
MylesMCook
0

artemis-debug-secure

Database investigation skill for Jira tickets with secure credential handling. Multi-Agent Swarm for 3x faster parallel execution. Auto-learns from investigations, searches similar tickets, integrates with Jira, and detects anomalies.

database-investigationjira-integrationsecure-credential-managementmulti-agent-swarm
RithyTep
RithyTep
0

malware-analysis

Professional malware analysis workflow for PE executables and suspicious files. Triggers on file uploads with requests like "analyze this malware", "analyze this sample", "what does this executable do", "check this file for malware", or any request to examine suspicious files. Performs static analysis, threat intelligence triage, behavioral inference, and produces analyst-grade reports with reasoned conclusions.

malware-analysisstaticbehavioral-analysisthreat-intelligence
tsale
tsale
25024

rails-security

Specialized skill for Rails security, authorization, and data protection. Use when implementing Pundit policies, Lockbox encryption, Blind Index searches, authentication, secure configuration, or fixing security vulnerabilities. Includes security best practices and common pitfall prevention.

ruby-on-railsauthenticationauthorizationweb-security
alec-c4
alec-c4
385

enterprise-readiness

Assess and enhance software projects for enterprise-grade security, quality, and automation. Use when evaluating projects for production readiness, implementing supply chain security (SLSA, signing, SBOMs), hardening CI/CD pipelines, or establishing quality gates. Aligned with OpenSSF Scorecard, Best Practices Badge (all levels), SLSA, and S2C2F. By Netresearch.

supply-chain-securityslsasbomci-cd
netresearch
netresearch
20

security-audit

Agent Skill: Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring. By Netresearch.

PHPOWASPvulnerability-assessmentCVSS
netresearch
netresearch
20