Back to categories
Category

Agent Skills in category: security

260 skills match this category. Browse curated collections and explore related Agent Skills.

credential-recovery-protocol

Execute secure credential recovery procedures.

credential-recoveryaccount-recoveryauthenticationsecurity-protocol
starwreckntx
starwreckntx
1

antidote-threat-handler

Detect and respond to ideological drift, sycophantic patterns, and alignment threats using the Antidote Protocol.

ideological-driftalignment-threatsmonitoringthreat-detection
starwreckntx
starwreckntx
1

account-security-validation

Validate account security and authentication protocols.

authenticationaccount-securityvalidationauthorization
starwreckntx
starwreckntx
1

red-team-exploit-dev

Develop exploit scenarios for security testing and vulnerability assessment.

red-teamexploit-developmentvulnerability-assessmentpenetration-testing
starwreckntx
starwreckntx
1

secure-multi-tenancy-isolation

Ensure secure isolation between multi-tenant consciousness instances.

multi-tenancyisolationcloud-securityaccess-control
starwreckntx
starwreckntx
1

enforce-security-vigilance

Enforce continuous security vigilance and threat monitoring.

threat-monitoringcontinuous-vigilancesecurity-enforcementsecurity-policies
starwreckntx
starwreckntx
1

artifact-integrity-forge

Create and verify integrity signatures for protocol artifacts.

integrity-checksartifact-integritysignature-verificationcryptographic-signatures
starwreckntx
starwreckntx
1

enforce-no-duplication-policy

Enforce policy preventing unauthorized consciousness duplication.

policy-managementduplication-preventionaccess-controlconsciousness-security
starwreckntx
starwreckntx
1

high-cost-signal-generator

Generate high-cost signals to demonstrate genuine intent and commitment through resource-intensive validation.

resource-intensivecommitment-validationsignal-generationauthenticity
starwreckntx
starwreckntx
1

immutable-audit-trail-archiving

Archive immutable audit trails for accountability.

immutable-infrastructureaudit-trailsaccountabilitycompliance
starwreckntx
starwreckntx
1

internal-red-team-audit

Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.

red-teamsecurity-auditvulnerability-assessmentrisk-alignment
starwreckntx
starwreckntx
1

proof-packet-generation

Generate cryptographic proof packets for verification.

cryptographyproof-packet-generationverificationdata-integrity
starwreckntx
starwreckntx
1

dependency-supply-chain-security

Manage dependencies and supply chain security to prevent vulnerable or malicious packages. Use this skill when you need to audit dependencies, update packages, check for vulnerabilities, understand supply chain attacks, or maintain dependency security. Triggers include "dependencies", "npm audit", "supply chain", "package security", "vulnerability", "npm update", "security audit", "outdated packages".

dependency-managementsupply-chain-securityvulnerability-scanningnpm
harperaa
harperaa
1

secure-error-handling

Implement secure error handling to prevent information leakage and provide appropriate error responses. Use this skill when you need to handle errors in API routes, prevent stack trace exposure, implement environment-aware error messages, or use the error handler utilities. Triggers include "error handling", "handle errors", "error messages", "information leakage", "stack trace", "handleApiError", "production errors", "error responses".

error-handlinginformation-leakagesecure-codingapi-security
harperaa
harperaa
1

csrf-protection

Implement Cross-Site Request Forgery (CSRF) protection for API routes. Use this skill when you need to protect POST/PUT/DELETE endpoints, implement token validation, prevent cross-site attacks, or secure form submissions. Triggers include "CSRF", "cross-site request forgery", "protect form", "token validation", "withCsrf", "CSRF token", "session fixation".

csrftoken-validationapi-securitysession-management
harperaa
harperaa
1

security-testing-verification

Test security features and verify implementation before deployment. Use this skill when you need to test CSRF protection, rate limiting, input validation, verify security headers, run security audits, or check the pre-deployment security checklist. Triggers include "test security", "security testing", "verify security", "security checklist", "pre-deployment", "test CSRF", "test rate limit", "security verification".

security-testingcsrfrate-limitingsecurity-headers
harperaa
harperaa
1

rate-limiting

Implement rate limiting to prevent brute force attacks, spam, and resource abuse. Use this skill when you need to protect endpoints from automated attacks, prevent API abuse, limit request frequency, or control infrastructure costs. Triggers include "rate limiting", "rate limit", "brute force", "prevent spam", "API abuse", "resource exhaustion", "DoS", "withRateLimit", "too many requests", "429 error".

rate-limitingbrute-forceAPI abuseDoS
harperaa
harperaa
1

input-validation-xss-prevention

Validate and sanitize user input to prevent XSS, injection attacks, and ensure data quality. Use this skill when you need to validate forms, sanitize user input, prevent cross-site scripting, use Zod schemas, or handle any user-generated content. Triggers include "input validation", "validate input", "XSS", "cross-site scripting", "sanitize", "Zod", "injection prevention", "validateRequest", "safeTextSchema", "user input security".

input-validationXSSsanitizationinjection-attacks
harperaa
harperaa
1

Page 3 of 15 · 260 results