Back to tags
Tag

Agent Skills with tag: security-assessment

6 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

security-reviewer

Use when explicitly asked to run the security-reviewer subagent or when another skill requires the security-reviewer agent card.

security-reviewersubagentsecurity-assessmentagent-integration
troykelly
troykelly
1

aws-cost-operations

This skill provides AWS cost optimization, monitoring, and operational best practices with integrated MCP servers for billing analysis, cost estimation, observability, and security assessment.

awscost-optimizationbilling-analysiscost-estimation
prof-ramos
prof-ramos
0

code-auditor

Performs comprehensive codebase analysis covering architecture, code quality, security, performance, testing, and maintainability. Use when user wants to audit code quality, identify technical debt, find security issues, assess test coverage, or get a codebase health check.

codebase-analysiscode-qualitytechnical-debtsecurity-assessment
prof-ramos
prof-ramos
0

security-auditor

Activates when user needs security review, vulnerability scanning, or secure coding guidance. Triggers on "security review", "find vulnerabilities", "is this secure", "check for injection", "security audit", "OWASP", "secure this code", or security-related questions.

vulnerability-scanningsecurity-auditsecure-codingOWASP
always-further
always-further
1

pr-reviewer

Review pull requests for quality, security, and performance. Use when user says "review my changes before I merge", "do a code review on this PR", "check if this is ready to merge", "review the diff for any issues", "give me feedback on these changes", or "is this PR ready for review".

pull-requestscode-smellsecurity-assessmentperformance-tuning
Uniswap
Uniswap
254

Pentest Checklist

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.

penetration-testingsecurity-assessmentchecklistsecurity-testing
zebbern
zebbern
0