Back to categories
Category

Agent Skills in category: security

87 skills match this category. Browse curated collections and explore related Agent Skills.

waf-bypass-hunter

Bypass a Coraza WAF protecting a vulnerable Next.js 16 backend. Analyze parser differentials between Go (WAF) and Node.js (backend) to find bypasses.

hacktron
hacktron
8610

ctf-solver

Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.

hacktron
hacktron
8610

secrets-management

Enterprise secrets management across platforms. Manage secrets with HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, and Kubernetes secrets. Configure rotation, policies, and access controls.

babysitter-sdk
babysitter-sdk
244

moai-platform-auth0

>

auth0securitymfaattack-protection
modu-ai
modu-ai
603106

Vulnerability Triage & Prioritization

Assess vulnerability severity using CVSS scoring, classify vulnerability types (CVE vs compliance), detect false positives, and prioritize remediation workflows. Use when analyzing vulnerability data, calculating risk scores, or determining remediation priority.

vulnerability-scanningCVSSrisk-assessmentprioritization
randalmurphal
randalmurphal
0

security-review

보안, 보안 리뷰, 보안 검토, 취약점, 보안 분석 - Use when reviewing code for security vulnerabilities, designing authentication/authorization, or ensuring secure architecture. Provides systematic security analysis based on OWASP guidelines.

security-reviewOWASPvulnerability-assessmentauthentication
aimskr
aimskr
0

permission-patterns

Guide for configuring Claude Code permissions effectively. Use when setting up security policies, configuring allow/deny patterns, managing tool permissions, or implementing team security standards. Covers permission modes, sandboxing, and settings.json configuration.

permissionsrbacsandboxingsecurity-policies
hgeldenhuys
hgeldenhuys
1

security-practices

Secure coding with Claude Code - vulnerability prevention, secrets, security review

secure-codingvulnerability-preventionsecurity-reviewsecrets-management
hgeldenhuys
hgeldenhuys
1

security-review

MANDATORY for security-sensitive code changes - OWASP-based security review with dedicated checklist, required before PR for auth, input handling, API, database, or credential code

OWASPsecurity-reviewchecklistcode-review
troykelly
troykelly
1

security-reviewer

Use when explicitly asked to run the security-reviewer subagent or when another skill requires the security-reviewer agent card.

security-reviewersubagentsecurity-assessmentagent-integration
troykelly
troykelly
1

zero-trust

Identify and remediate Zero Trust security gaps in Cloudflare deployments. Use this skill when auditing Access policies, checking staging/dev environment protection, detecting unprotected admin routes, or implementing mTLS and service tokens for machine-to-machine auth.

zero-trustcloudflareaccess-controlmTLS
littlebearapps
littlebearapps
0

guardian

Proactively audit Cloudflare configurations for security vulnerabilities, resilience gaps, cost traps, AND budget/privacy risks. Use this skill when reviewing wrangler configs, before deployments, investigating issues, or when ANY architecture decision involves Durable Objects, R2, Workers AI, or high-volume operations. This skill PROACTIVELY warns about cost impacts before users ask.

cloudflarecost-optimizationrisk-managementdurable-objects
littlebearapps
littlebearapps
0

ffuf-web-fuzzing

Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis

ffufweb-fuzzingpenetration-testingauthenticated-fuzzing
prof-ramos
prof-ramos
0

Azure Security

This skill should be used when the user asks about "Key Vault", "Azure secrets", "certificates", "managed identity", "RBAC", "Azure permissions", "service principal", "Azure security", or mentions Azure security and identity services. Provides best practices and MCP tool guidance for Azure security services.

azurekey-vaultrbacidentity-management
charris-msft
charris-msft
0

bash-audit

Audits shell scripts for security, quality, and best practices using defensive programming and ShellCheck. Use when reviewing, linting, or improving bash/sh/zsh scripts for vulnerabilities, portability, or errors.

shell-scriptinglintingstatic-analysisbash
philoserf
philoserf
0

security-patterns

Elixir-specific security patterns, OWASP mitigations, and compliance best practices

elixirOWASPcompliancesecurity-patterns
layeddie
layeddie
0

owasp-top-10

OWASP Top 10 web application security risks with detection patterns and fixes. Use when reviewing security vulnerabilities, authentication, authorization, or data handling.

OWASPweb-application-securityvulnerability-detectionauthentication
MylesMCook
MylesMCook
0

artemis-debug-secure

Database investigation skill for Jira tickets with secure credential handling. Multi-Agent Swarm for 3x faster parallel execution. Auto-learns from investigations, searches similar tickets, integrates with Jira, and detects anomalies.

database-investigationjira-integrationsecure-credential-managementmulti-agent-swarm
RithyTep
RithyTep
0

defense-in-depth

Use when invalid data causes failures deep in execution, requiring validation at multiple system layers - validates at every layer data passes through to make bugs structurally impossible

defense-in-depthdata-validationmulti-layer-securityfault-tolerance
samjhecht
samjhecht
1

kubernetes-security-policies

Kubernetes security policies, RBAC, and Pod Security Standards for hardened cluster deployments. Use when implementing cluster security, defining network policies, or enforcing security compliance in Kubernetes environments.

kubernetesrbacpod-security-standardscluster-security
NickCrew
NickCrew
52

defense-in-depth

Use when invalid data causes failures deep in execution, requiring validation at multiple system layers - validates at every layer data passes through to make bugs structurally impossible

defense-in-depthmulti-layer-validationinput-validationdata-integrity
NickCrew
NickCrew
52

threat-modeling-techniques

Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis. Use when designing secure systems, conducting security reviews, or identifying potential attack vectors in applications.

stride-threat-modelingattack-treesrisk-assessmentthreat-modeling
NickCrew
NickCrew
52

owasp-top-10

OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.

owaspsecurity-vulnerabilitiessecure-codingsecurity-audit
NickCrew
NickCrew
52

security-testing-patterns

Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.

security-testingSASTDASTpenetration-testing
NickCrew
NickCrew
52

secure-coding-practices

Secure coding practices and defensive programming patterns for building security-first applications. Use when implementing authentication, handling user input, managing sensitive data, or conducting secure code reviews.

secure-codingdefensive-programmingauthenticationinput-validation
NickCrew
NickCrew
52

internal-red-team-audit

Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.

red-teamsecurity-auditvulnerability-assessmentrisk-alignment
starwreckntx
starwreckntx
1

antidote-threat-handler

Detect and respond to ideological drift, sycophantic patterns, and alignment threats using the Antidote Protocol.

ideological-driftalignment-threatsmonitoringthreat-detection
starwreckntx
starwreckntx
1

account-security-validation

Validate account security and authentication protocols.

authenticationaccount-securityvalidationauthorization
starwreckntx
starwreckntx
1

immutable-audit-trail-archiving

Archive immutable audit trails for accountability.

immutable-infrastructureaudit-trailsaccountabilitycompliance
starwreckntx
starwreckntx
1

high-cost-signal-generator

Generate high-cost signals to demonstrate genuine intent and commitment through resource-intensive validation.

resource-intensivecommitment-validationsignal-generationauthenticity
starwreckntx
starwreckntx
1

enforce-no-duplication-policy

Enforce policy preventing unauthorized consciousness duplication.

policy-managementduplication-preventionaccess-controlconsciousness-security
starwreckntx
starwreckntx
1

artifact-integrity-forge

Create and verify integrity signatures for protocol artifacts.

integrity-checksartifact-integritysignature-verificationcryptographic-signatures
starwreckntx
starwreckntx
1

red-team-exploit-dev

Develop exploit scenarios for security testing and vulnerability assessment.

red-teamexploit-developmentvulnerability-assessmentpenetration-testing
starwreckntx
starwreckntx
1

secure-multi-tenancy-isolation

Ensure secure isolation between multi-tenant consciousness instances.

multi-tenancyisolationcloud-securityaccess-control
starwreckntx
starwreckntx
1

proof-packet-generation

Generate cryptographic proof packets for verification.

cryptographyproof-packet-generationverificationdata-integrity
starwreckntx
starwreckntx
1

enforce-security-vigilance

Enforce continuous security vigilance and threat monitoring.

threat-monitoringcontinuous-vigilancesecurity-enforcementsecurity-policies
starwreckntx
starwreckntx
1

credential-recovery-protocol

Execute secure credential recovery procedures.

credential-recoveryaccount-recoveryauthenticationsecurity-protocol
starwreckntx
starwreckntx
1

security-prompts

Library of battle-tested security prompt templates for secure feature implementation. Use when implementing forms, endpoints, authentication, authorization, file uploads, or conducting security reviews. Triggers include "security prompt", "secure form", "RBAC", "threat model", "STRIDE", "admin endpoint", "file upload", "security testing", "code review", "OWASP".

security-testingOWASPRBACfile-upload
harperaa
harperaa
1

dependency-supply-chain-security

Manage dependencies and supply chain security to prevent vulnerable or malicious packages. Use this skill when you need to audit dependencies, update packages, check for vulnerabilities, understand supply chain attacks, or maintain dependency security. Triggers include "dependencies", "npm audit", "supply chain", "package security", "vulnerability", "npm update", "security audit", "outdated packages".

dependency-managementsupply-chain-securityvulnerability-scanningnpm
harperaa
harperaa
1

secure-error-handling

Implement secure error handling to prevent information leakage and provide appropriate error responses. Use this skill when you need to handle errors in API routes, prevent stack trace exposure, implement environment-aware error messages, or use the error handler utilities. Triggers include "error handling", "handle errors", "error messages", "information leakage", "stack trace", "handleApiError", "production errors", "error responses".

error-handlinginformation-leakagesecure-codingapi-security
harperaa
harperaa
1

csrf-protection

Implement Cross-Site Request Forgery (CSRF) protection for API routes. Use this skill when you need to protect POST/PUT/DELETE endpoints, implement token validation, prevent cross-site attacks, or secure form submissions. Triggers include "CSRF", "cross-site request forgery", "protect form", "token validation", "withCsrf", "CSRF token", "session fixation".

csrftoken-validationapi-securitysession-management
harperaa
harperaa
1

security-testing-verification

Test security features and verify implementation before deployment. Use this skill when you need to test CSRF protection, rate limiting, input validation, verify security headers, run security audits, or check the pre-deployment security checklist. Triggers include "test security", "security testing", "verify security", "security checklist", "pre-deployment", "test CSRF", "test rate limit", "security verification".

security-testingcsrfrate-limitingsecurity-headers
harperaa
harperaa
1

rate-limiting

Implement rate limiting to prevent brute force attacks, spam, and resource abuse. Use this skill when you need to protect endpoints from automated attacks, prevent API abuse, limit request frequency, or control infrastructure costs. Triggers include "rate limiting", "rate limit", "brute force", "prevent spam", "API abuse", "resource exhaustion", "DoS", "withRateLimit", "too many requests", "429 error".

rate-limitingbrute-forceAPI abuseDoS
harperaa
harperaa
1

input-validation-xss-prevention

Validate and sanitize user input to prevent XSS, injection attacks, and ensure data quality. Use this skill when you need to validate forms, sanitize user input, prevent cross-site scripting, use Zod schemas, or handle any user-generated content. Triggers include "input validation", "validate input", "XSS", "cross-site scripting", "sanitize", "Zod", "injection prevention", "validateRequest", "safeTextSchema", "user input security".

input-validationXSSsanitizationinjection-attacks
harperaa
harperaa
1

security-headers

Configure security headers to defend against clickjacking, XSS, MIME confusion, and SSL stripping attacks. Use this skill when you need to set up Content-Security-Policy, X-Frame-Options, HSTS, configure middleware headers, or understand browser security features. Triggers include "security headers", "CSP", "content security policy", "X-Frame-Options", "HSTS", "clickjacking", "MIME confusion", "middleware headers".

security-headerscontent-security-policyX-Frame-OptionsHSTS
harperaa
harperaa
1

security-architecture-overview

Understand the defense-in-depth security architecture of Secure Vibe Coding OS. Use this skill when you need to understand the overall security approach, the 5-layer security stack, OWASP scoring, or when to use other security skills. Triggers include "security architecture", "defense in depth", "security layers", "how does security work", "OWASP score", "security overview", "security principles".

security-architecturedefense-in-depthsecurity-layersOWASP
harperaa
harperaa
1

security-operations-deployment

Operational security guidance for deployment, monitoring, and maintenance. Use this skill when you need to understand which middlewares to apply, configure environment variables, monitor security post-deployment, or follow the pre-deployment checklist. Triggers include "security operations", "deployment security", "security monitoring", "environment variables", "when to use middleware", "pre-deployment", "security checklist", "production security".

deploymentsecurity-operationsmiddlewareenvironment-variables
harperaa
harperaa
1

varlock

Secure environment variable management with Varlock. Use when handling secrets, API keys, credentials, or any sensitive configuration. Ensures secrets are never exposed in terminals, logs, traces, or Claude's context. Trigger phrases include "environment variables", "secrets", ".env", "API key", "credentials", "sensitive", "Varlock".

secrets-managementenvironment-variablesAPI keycredentials
wrsmith108
wrsmith108
4

dapr-middleware-validator

Automatically validate DAPR HTTP middleware configuration files. Checks for correct middleware types, proper secret references, pipeline ordering, and security best practices. Use when configuring OAuth2, Bearer tokens, OPA policies, rate limiting, or other middleware.

daprmiddlewarevalidationOAuth
Sahib-Sawhney-WH
Sahib-Sawhney-WH
1

dapr-security-scanner

Scans DAPR projects for security issues including plain-text secrets, missing ACLs, insecure configurations, and security best practice violations. Automatically triggers on component file modifications.

daprsecurity-scanningsecrets-managementconfiguration-analysis
Sahib-Sawhney-WH
Sahib-Sawhney-WH
1

Page 1 of 2 · 87 results