Back to categories
Category

Agent Skills in category: security

260 skills match this category. Browse curated collections and explore related Agent Skills.

llamaguard

Meta's 7-8B specialized moderation model for LLM input/output filtering. 6 safety categories - violence/hate, sexual content, weapons, substances, self-harm, criminal planning. 94-95% accuracy. Deploy with vLLM, HuggingFace, Sagemaker. Integrates with NeMo Guardrails.

moderationsafetycontent-filteringllm-integration
ovachiever
ovachiever
81

cloudflare-turnstile

|

captchabot-mitigationcloudflareauth
ovachiever
ovachiever
81

Azure Security

This skill should be used when the user asks about "Key Vault", "Azure secrets", "certificates", "managed identity", "RBAC", "Azure permissions", "service principal", "Azure security", or mentions Azure security and identity services. Provides best practices and MCP tool guidance for Azure security services.

azurekey-vaultrbacidentity-management
charris-msft
charris-msft
0

bash-audit

Audits shell scripts for security, quality, and best practices using defensive programming and ShellCheck. Use when reviewing, linting, or improving bash/sh/zsh scripts for vulnerabilities, portability, or errors.

shell-scriptinglintingstatic-analysisbash
philoserf
philoserf
0

1password

Guide for implementing 1Password secrets management - CLI operations, service accounts, and Kubernetes integration. Use when retrieving secrets, managing vaults, configuring CI/CD pipelines, integrating with External Secrets Operator, or automating secrets workflows with 1Password.

secrets-management1passwordkubernetescli
julianobarbosa
julianobarbosa
0

defectdojo

Guide for implementing DefectDojo - an open-source DevSecOps, ASPM, and vulnerability management platform. Use when querying vulnerabilities, managing findings, configuring CI/CD pipeline imports, or working with security scan data. Includes MCP tools for direct API interaction.

devsecopsvulnerability-scanningapi-integrationci-cd
julianobarbosa
julianobarbosa
0

dependency-track-skill

Comprehensive guide for Dependency-Track - Software Composition Analysis (SCA) and SBOM management platform. USE WHEN deploying Dependency-Track, integrating with CI/CD pipelines, configuring vulnerability scanning, managing SBOMs, setting up policy compliance, troubleshooting installation issues, or working with the REST API.

sbomdependency-managementvulnerability-scanningpolicy-management
julianobarbosa
julianobarbosa
0

senhasegura-skill

Comprehensive senhasegura PAM platform skill for secrets management, credential vaulting, SSH key rotation, and DevOps secrets integration. Use when working with senhasegura A2A APIs, DSM CLI, MySafe, credential management, password rotation, External Secrets Operator integration, or any senhasegura PAM operations.

secrets-managementcredential-vaultingpassword-rotationdevops
julianobarbosa
julianobarbosa
0

security-patterns

Elixir-specific security patterns, OWASP mitigations, and compliance best practices

elixirOWASPcompliancesecurity-patterns
layeddie
layeddie
0

owasp-top-10

OWASP Top 10 web application security risks with detection patterns and fixes. Use when reviewing security vulnerabilities, authentication, authorization, or data handling.

OWASPweb-application-securityvulnerability-detectionauthentication
MylesMCook
MylesMCook
0

artemis-debug-secure

Database investigation skill for Jira tickets with secure credential handling. Multi-Agent Swarm for 3x faster parallel execution. Auto-learns from investigations, searches similar tickets, integrates with Jira, and detects anomalies.

database-investigationjira-integrationsecure-credential-managementmulti-agent-swarm
RithyTep
RithyTep
0

defense-in-depth

Use when invalid data causes failures deep in execution, requiring validation at multiple system layers - validates at every layer data passes through to make bugs structurally impossible

defense-in-depthdata-validationmulti-layer-securityfault-tolerance
samjhecht
samjhecht
1

threat-modeling-techniques

Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis. Use when designing secure systems, conducting security reviews, or identifying potential attack vectors in applications.

stride-threat-modelingattack-treesrisk-assessmentthreat-modeling
NickCrew
NickCrew
52

kubernetes-security-policies

Kubernetes security policies, RBAC, and Pod Security Standards for hardened cluster deployments. Use when implementing cluster security, defining network policies, or enforcing security compliance in Kubernetes environments.

kubernetesrbacpod-security-standardscluster-security
NickCrew
NickCrew
52

owasp-top-10

OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.

owaspsecurity-vulnerabilitiessecure-codingsecurity-audit
NickCrew
NickCrew
52

security-testing-patterns

Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.

security-testingSASTDASTpenetration-testing
NickCrew
NickCrew
52

secure-coding-practices

Secure coding practices and defensive programming patterns for building security-first applications. Use when implementing authentication, handling user input, managing sensitive data, or conducting secure code reviews.

secure-codingdefensive-programmingauthenticationinput-validation
NickCrew
NickCrew
52

defense-in-depth

Use when invalid data causes failures deep in execution, requiring validation at multiple system layers - validates at every layer data passes through to make bugs structurally impossible

defense-in-depthmulti-layer-validationinput-validationdata-integrity
NickCrew
NickCrew
52

Page 2 of 15 · 260 results