Back to categories
Category

Agent Skills in category: security

260 skills match this category. Browse curated collections and explore related Agent Skills.

malware-analysis

Professional malware analysis workflow for PE executables and suspicious files. Triggers on file uploads with requests like "analyze this malware", "analyze this sample", "what does this executable do", "check this file for malware", or any request to examine suspicious files. Performs static analysis, threat intelligence triage, behavioral inference, and produces analyst-grade reports with reasoned conclusions.

malware-analysisstaticbehavioral-analysisthreat-intelligence
tsale
tsale
19713

audit-security

Security-focused audit that can run in background during implementation. Checks for vulnerabilities, auth issues, data exposure. Injects P0 findings to main agent.

vulnerability-scanningbackground-processauthdata-exposure
ferdiangunawan
ferdiangunawan
2

form-security

Security patterns for web forms including autocomplete attributes for password managers, CSRF protection, XSS prevention, and input sanitization. Use when implementing authentication forms, payment forms, or any form handling sensitive data.

csrfxssinput-validationform-handling
Bbeierle12
Bbeierle12
3

audit-security

Security-focused audit that can run in background during implementation. Checks for vulnerabilities, auth issues, data exposure. Injects P0 findings to main agent.

vulnerability-scanningsecurity-assessmentautomated-security-testingaccess-control
ferdiangunawan
ferdiangunawan
2

security

DevSecOps practices including secrets management, SSL/TLS, vulnerability scanning, and compliance

devopscredentials-managementvulnerability-scanningssl-tls
pluginagentmarketplace
pluginagentmarketplace
2

GitLab Stack Secrets Manager

Manages Docker secrets for GitLab stack projects, ensuring secrets are never in .env or docker-compose.yml, properly stored in ./secrets directory, and securely integrated with Docker secrets. Use when users need to create secrets, migrate from environment variables, validate secret configuration, audit secret usage, or ensure secrets are never committed to git.

gitlabdocker-integrationsecrets-managementbest-practices
rknall
rknall
92

owasp-mobile-security-checker

Analyze Flutter and mobile applications for OWASP Mobile Top 10 (2024) security compliance. Use this skill when performing security audits, vulnerability assessments, or compliance checks on mobile applications. Performs automated scans for hardcoded secrets, insecure storage, weak cryptography, network security issues, and provides detailed remediation guidance.

security-scanningvulnerability-scanningmobile-securityOWASP
Harishwarrior
Harishwarrior
72

secure-web-search

Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check information, or mentions secure search, privacy, source validation, or web research.

web-securityprivacysource-verificationfact-checking
ronnycoding
ronnycoding
6

security-scanner

Comprehensive security scanning for SAST, secrets, OWASP vulnerabilities, container and IaC security

static-analysisvulnerability-scanningOWASPinfrastructure-as-code
benreceveur
benreceveur
31

devsecops-expert

Expert DevSecOps engineer specializing in secure CI/CD pipelines, shift-left security, security automation, and compliance as code. Use when implementing security gates, container security, infrastructure scanning, secrets management, or building secure supply chains.

devopsci-cdautomated-security-testingsupply-chain-security
martinholovsky
martinholovsky
92

cilium-expert

Expert in Cilium eBPF-based networking and security for Kubernetes. Use for CNI setup, network policies (L3/L4/L7), service mesh, Hubble observability, zero-trust security, and cluster-wide network troubleshooting. Specializes in high-performance, secure cluster networking.

kubernetescontainer-orchestrationebpfnetwork-policies
martinholovsky
martinholovsky
92

websocket

Real-time bidirectional communication with security focus on CSWSH prevention, authentication, and message validation

network-protocolsweb-securityauthenticationmessage-validation
martinholovsky
martinholovsky
92

appsec-expert

Elite Application Security engineer specializing in secure SDLC, OWASP Top 10 2025, SAST/DAST/SCA integration, threat modeling (STRIDE), and vulnerability remediation. Expert in security testing, cryptography, authentication patterns, and DevSecOps automation. Use when securing applications, implementing security controls, or conducting security assessments.

owaspstatic-analysisvulnerability-assessmentsecurity-testing
martinholovsky
martinholovsky
92

SQLCipher Encrypted Database Expert

Expert in SQLCipher encrypted database development with focus on encryption key management, key rotation, secure data handling, and cryptographic best practices

database-securitysqlcipherencryptionkey-management
martinholovsky
martinholovsky
92

enforcement

Use when implementing hooks that BLOCK invalid actions, creating quality gates for state transitions, or enforcing tested:true verification. Load when designing enforcement mechanisms. Uses exit code 2 to block, JSON permissionDecision:deny, or updatedInput modification. Rules are instructions; hooks are enforcement.

access-controlquality-gateshooksstate-management
ingpoc
ingpoc
5

security-patterns

Security patterns and OWASP guidelines. Triggers on: security review, OWASP, XSS, SQL injection, CSRF, authentication, authorization, secrets management, input validation, secure coding.

owaspweb-securityinjection-attacksauthentication
0xDarkMatter
0xDarkMatter
3

security

Web application security best practices including OWASP Top 10, authentication, authorization, input validation, cryptography, and secure coding patterns. Use when implementing security features, reviewing code for vulnerabilities, hardening applications, or fixing security issues.

web-application-securityOWASPauthenticationauthorization
vapvarun
vapvarun
3

wp-security-review

WordPress security audit and vulnerability analysis. Use when reviewing WordPress code for security issues, auditing themes/plugins for vulnerabilities, checking authentication/authorization, analyzing input validation, or detecting security anti-patterns, or when user mentions "security review", "security audit", "vulnerability", "XSS", "SQL injection", "CSRF", "nonce", "sanitize", "escape", "validate", "authentication", "authorization", "permissions", "capabilities", "hacked", or "malware".

wordpressplugin-hooksweb-vulnerability-scanningsecurity-assessment
vapvarun
vapvarun
3

Page 8 of 15 · 260 results