credential-recovery-protocol
Execute secure credential recovery procedures.
antidote-threat-handler
Detect and respond to ideological drift, sycophantic patterns, and alignment threats using the Antidote Protocol.
account-security-validation
Validate account security and authentication protocols.
red-team-exploit-dev
Develop exploit scenarios for security testing and vulnerability assessment.
secure-multi-tenancy-isolation
Ensure secure isolation between multi-tenant consciousness instances.
enforce-security-vigilance
Enforce continuous security vigilance and threat monitoring.
artifact-integrity-forge
Create and verify integrity signatures for protocol artifacts.
enforce-no-duplication-policy
Enforce policy preventing unauthorized consciousness duplication.
high-cost-signal-generator
Generate high-cost signals to demonstrate genuine intent and commitment through resource-intensive validation.
immutable-audit-trail-archiving
Archive immutable audit trails for accountability.
internal-red-team-audit
Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.
proof-packet-generation
Generate cryptographic proof packets for verification.
dependency-supply-chain-security
Manage dependencies and supply chain security to prevent vulnerable or malicious packages. Use this skill when you need to audit dependencies, update packages, check for vulnerabilities, understand supply chain attacks, or maintain dependency security. Triggers include "dependencies", "npm audit", "supply chain", "package security", "vulnerability", "npm update", "security audit", "outdated packages".
secure-error-handling
Implement secure error handling to prevent information leakage and provide appropriate error responses. Use this skill when you need to handle errors in API routes, prevent stack trace exposure, implement environment-aware error messages, or use the error handler utilities. Triggers include "error handling", "handle errors", "error messages", "information leakage", "stack trace", "handleApiError", "production errors", "error responses".
csrf-protection
Implement Cross-Site Request Forgery (CSRF) protection for API routes. Use this skill when you need to protect POST/PUT/DELETE endpoints, implement token validation, prevent cross-site attacks, or secure form submissions. Triggers include "CSRF", "cross-site request forgery", "protect form", "token validation", "withCsrf", "CSRF token", "session fixation".
security-testing-verification
Test security features and verify implementation before deployment. Use this skill when you need to test CSRF protection, rate limiting, input validation, verify security headers, run security audits, or check the pre-deployment security checklist. Triggers include "test security", "security testing", "verify security", "security checklist", "pre-deployment", "test CSRF", "test rate limit", "security verification".
rate-limiting
Implement rate limiting to prevent brute force attacks, spam, and resource abuse. Use this skill when you need to protect endpoints from automated attacks, prevent API abuse, limit request frequency, or control infrastructure costs. Triggers include "rate limiting", "rate limit", "brute force", "prevent spam", "API abuse", "resource exhaustion", "DoS", "withRateLimit", "too many requests", "429 error".
input-validation-xss-prevention
Validate and sanitize user input to prevent XSS, injection attacks, and ensure data quality. Use this skill when you need to validate forms, sanitize user input, prevent cross-site scripting, use Zod schemas, or handle any user-generated content. Triggers include "input validation", "validate input", "XSS", "cross-site scripting", "sanitize", "Zod", "injection prevention", "validateRequest", "safeTextSchema", "user input security".
Page 3 of 15 · 260 results