Back to categories
Category

Agent Skills in category: security

260 skills match this category. Browse curated collections and explore related Agent Skills.

mongodb-security-admin

Master MongoDB security, authentication, authorization, encryption, and backup. Learn role-based access control, TLS/SSL, encryption, and disaster recovery. Use when securing deployments, managing users, or implementing compliance.

mongodbdatabase-securityencryptionauthentication
pluginagentmarketplace
pluginagentmarketplace
1

security-encryption

Game server security including encryption, anti-cheat, and secure communication

encryptionanti-cheatgame-server-securitysecure-communication
pluginagentmarketplace
pluginagentmarketplace
2

security-architecture

Design security architectures with threat modeling and zero trust

security-architecturethreat-modelingzero-trustsecurity-policies
pluginagentmarketplace
pluginagentmarketplace
1

security-review

Security review checklist for code changes. Automatically activates when reviewing security-sensitive code, authentication, authorization, or data handling.

security-reviewcode-reviewauthenticationauthorization
ken2403
ken2403
2

security-checklist

Pre-deployment security audit for web applications. Use when reviewing code before shipping, auditing an existing application, or when users mention "security review," "ready to deploy," "going to production," or express concern about vulnerabilities. Covers authentication, input validation, secrets management, database security, and compliance basics.

security-assessmentpre-deploymentauthenticationinput-validation
jamditis
jamditis
1

api-hardening

API security hardening patterns. Use when implementing rate limiting, input validation, CORS configuration, API key management, request throttling, or protecting endpoints from abuse. Covers defense-in-depth strategies for REST APIs with practical implementations for Express, FastAPI, and serverless.

api-securityrate-limitinginput-validationcors
jamditis
jamditis
1

security-review

>-

security-reviewvulnerability-assessmentrisk-assessmentcompliance
bostonaholic
bostonaholic
1

doppler

Fetch secrets from Doppler for API keys and credentials.

secrets-managementcredentials-managementAPI-keysdoppler
elliottminns
elliottminns
1

sui-keypair-cryptography

Helps Claude Code understand Sui blockchain keypair and cryptography operations, providing guidelines and examples for key generation, signing, verification, address derivation, and multi-signature scheme support. Use when working with cryptography in Sui development or when the user mentions keypairs, cryptography, signing, or verification.

cryptographyblockchainkey-managementdigital-signatures
RandyPen
RandyPen
1

sast-configuration

Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application code. Use when setting up security scanning, implementing DevSecOps practices, or automating code vulnerability detection.

sastsecurity-scanningautomated-vulnerability-detectiondevsecops
camoneart
camoneart
4

solidity-security

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementing security measures for blockchain applications.

soliditysmart-contractsblockchainvulnerabilities
camoneart
camoneart
4

pci-compliance

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card security measures.

pci-compliancepayment-gatewaypayment-processingpayment
camoneart
camoneart
4

k8s-security-policies

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or enforcing pod security standards.

kuberneteskubernetes-securityrbacnetwork-policies
camoneart
camoneart
4

gdpr-auditor

This skill should be used when analyzing codebases, applications, databases, or systems for GDPR (General Data Protection Regulation) compliance. Use this skill when users need to audit data protection practices, identify potential compliance issues, assess data handling procedures, review privacy policies, or ensure adherence to EU data protection requirements.

GDPRcomplianceauditprivacy
diegocconsolini
diegocconsolini
3

cybersecurity-policy-generator

Generate enterprise cybersecurity policies from 51 professional templates (SANS, CIS Controls) for ISO 27001, SOC 2, NIST, and CIS Controls compliance in Markdown, Word, HTML, and PDF formats

compliance-automationpolicy-managementISO-27001SOC-2
diegocconsolini
diegocconsolini
3

Security Architect

Comprehensive security architecture combining threat modeling, security-first design, secure coding review, and compliance validation. Consolidated from threat-modeling, security-first-design, secure-coding-review, and compliance-validator.

security-architecturethreat-modelingsecure-coding-reviewcompliance-validation
daffy0208
daffy0208
55

Security Engineer

Implement security best practices across the application stack. Use when securing APIs, implementing authentication, preventing vulnerabilities, or conducting security reviews. Covers OWASP Top 10, auth patterns, input validation, encryption, and security monitoring.

OWASPauthenticationinput-validationencryption
daffy0208
daffy0208
55

forensic-data-engineer

Expert in data forensics, anomaly detection, audit trail analysis, fraud detection, and breach investigation

anomaly-detectiondata-forensicsaudit-trail-analysisfraud-detection
daffy0208
daffy0208
55

Page 7 of 15 · 260 results