Back to categories
Category

Agent Skills in category: security

260 skills match this category. Browse curated collections and explore related Agent Skills.

security-audit

Performs comprehensive security audits identifying vulnerabilities, misconfigurations, and security best practice violations. Trigger keywords: security, audit, vulnerability, CVE, OWASP, penetration, security review, hardening.

vulnerability-assessmentpenetration-testingsecurity-testingOWASP
cosmix
cosmix
3

security-scan

Quick routine security checks for secrets, dependencies, and common vulnerabilities. Run frequently during development. Triggers: security scan, quick scan, secrets check, vulnerability check, security check, pre-commit security, routine security.

security-testingvulnerability-assessmentsupply-chain-security
cosmix
cosmix
3

threat-model

Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing risk. Triggers: threat model, STRIDE, DREAD, attack surface, security architecture, trust boundary, threat vector, risk assessment.

threat-modelingSTRIDEDREADattack-trees
cosmix
cosmix
3

dependency-scan

Scans project dependencies for known vulnerabilities, outdated packages, and license compliance issues. Trigger keywords: dependency, vulnerability, CVE, npm audit, outdated, license, supply chain, SBOM.

dependency-managementsbomCVEsupply-chain-security
cosmix
cosmix
3

phi_detection

>

nlpdata-protectionHIPAA-compliancephi-detection
GOATnote-Inc
GOATnote-Inc
31

skill-security-analyzer

Comprehensive security risk analysis for Claude skills. Use when asked to analyze security risks, review security stance, audit skills for vulnerabilities, check security before deployment, or evaluate safety of skill files. Triggers include "analyze security," "security risks," "security audit," "security review," "is this skill safe," or "check for vulnerabilities."

security-assessmentsecurity-testingvulnerability-assessmentclaude-skills
Exploration-labs
Exploration-labs
72

secure-flow

A comprehensive security skill that integrates with Secure Flow to help AI coding agents write secure code, perform security reviews, and implement security best practices. Use this skill when writing, reviewing, or modifying code to ensure secure-by-default practices are followed.

secure-codingcode-reviewbest-practicessecurity-testing
plutosecurity
plutosecurity
5

security-checklist

Use this skill when implementing security measures or conducting security audits. Provides OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines. Ensures applications are secure against common vulnerabilities.

owaspauthenticationinput-validationcompliance-audit
ArieGoldkin
ArieGoldkin
7

working-with-provenance

Use when tracing Konflux builds from image references, finding build logs from artifacts, or verifying source commits for container images - extracts provenance attestations to navigate from images back to builds and source code

slsasupply-chain-securitycontainerscontainer-registry
konflux-ci
konflux-ci
64

security-guardian

Expert en sécurité applicative pour détecter les vulnérabilités, auditer le code, et guider les bonnes pratiques de sécurité. OWASP Top 10, authentification, autorisation, cryptographie, gestion de secrets. Utiliser pour audits sécurité, reviews de code sensible, conception de features sécurisées, ou résolution de failles.

OWASPauthenticationauthorizationcryptography
Bikach
Bikach
10

security-patterns

Comprehensive OWASP security guidelines, secure coding patterns, vulnerability prevention strategies, and remediation best practices for building secure applications

web-application-securityowaspsecure-coding
bejranonda
bejranonda
1111

haveibeenpwned

HaveIBeenPwned API Documentation - Check if email accounts or passwords have been compromised in data breaches

rest-apiemail-securitypassword-securitydata-breach
rawveg
rawveg
112

security-threat-model

Use when designing or reviewing systems handling sensitive data (PII, PHI, financial, auth credentials), building features with security implications (auth, payments, file uploads, APIs), preparing for security audits or compliance (PCI, HIPAA, SOC 2), investigating security incidents, integrating third-party services, or when user mentions "threat model", "security architecture", "STRIDE", "trust boundaries", "attack surface", or "security review".

threat-modelingattack-surface-mappingrisk-assessmentcompliance-audit
lyndonkl
lyndonkl
82

security-stride-methodology

Activate when conducting security analysis using STRIDE threat modeling, vulnerability assessment, and security architecture evaluation

threat-modelingstride-threat-modelingvulnerability-assessmentsecurity-architecture
vinnie357
vinnie357
122

cel-k8s

Write production-ready CEL (Common Expression Language) code for Kubernetes ValidatingAdmissionPolicies, CRD validation rules, and security policies. Use when users need to create admission policies, validate Kubernetes resources, enforce security constraints, or write CEL expressions for Kubernetes.

kubernetescontainer-orchestrationceladmission-controller
tyrchen
tyrchen
153

security-practices

Modern security standards including Zero Trust Architecture, supply chain security, DevSecOps integration, and cloud-native protection

zero-trust-architecturesupply-chain-securitydevsecopscloud-security
williamzujkowski
williamzujkowski
11

nist-compliance

NIST 800-53r5 control implementation, tagging, evidence collection, and compliance automation for security frameworks

regulatory-compliancestandards-compliancenist-800-53compliance-automation
williamzujkowski
williamzujkowski
11

secure-code-guardian

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. Keywords: security, authentication, authorization, OWASP, encryption, vulnerability.

authenticationauthorizationencryptionOWASP
Jeffallan
Jeffallan
245

Page 9 of 15 · 260 results