Back to tags
Tag

Agent Skills with tag: vulnerability-scanning

36 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

security-reviewer

Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews. Keywords: security review, vulnerability, SAST, audit, penetration testing, cloud security.

vulnerability-scanningpenetration-testingstatic-analysiscloud-security
Jeffallan
Jeffallan
245

dependency-auditor

Automated security auditing of project dependencies to identify known vulnerabilities.

vulnerability-scanningautomated-security-testingsbomsupply-chain-security
CuriousLearner
CuriousLearner
163

secret-scanner

Detect accidentally committed secrets, credentials, and sensitive information in code.

static-analysisvulnerability-scanningsecret-detection
CuriousLearner
CuriousLearner
163

auth-analyzer

Review and analyze authentication and authorization patterns for security vulnerabilities.

authenticationauthorizationsecurity-assessmentvulnerability-scanning
CuriousLearner
CuriousLearner
163

ln-621-security-auditor

Security audit worker (L3). Scans codebase for hardcoded secrets, SQL injection, XSS, insecure dependencies, missing input validation. Returns findings with severity (Critical/High/Medium/Low), location, effort, and recommendations.

static-analysisvulnerability-scanningsql-injectionxss
levnikolaevich
levnikolaevich
246

codex-analyze

Orchestrate Codex CLI for comprehensive code analysis (bugs, security, performance, and quality). Use when deep analysis is requested or when the scope is large; ask for scope if unclear.

static-analysiscode-qualityvulnerability-scanningperformance-optimization
vaayne
vaayne
20

container-registry-management

Manage container registries (Docker Hub, ECR, GCR) with image scanning, retention policies, and access control.

dockercontainer-registryvulnerability-scanningaccess-control
aj-geddes
aj-geddes
301

dependency-management

Manage project dependencies across languages including npm install, package versioning, dependency conflicts, security scanning, and lock files. Use when dealing with dependencies, version pinning, semantic versioning, or resolving conflicts.

npmpackage-managementversioningvulnerability-scanning
aj-geddes
aj-geddes
301

security-testing

Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security test, vulnerability scanning, OWASP, SQL injection, XSS, CSRF, and penetration testing.

static-analysispenetration-testingvulnerability-scanningweb-application-security
aj-geddes
aj-geddes
301

static-code-analysis

Implement static code analysis with linters, formatters, and security scanners to catch bugs early. Use when enforcing code standards, detecting security vulnerabilities, or automating code review.

static-analysiscode-qualitycode-reviewvulnerability-scanning
aj-geddes
aj-geddes
301

vulnerability-scanning

Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.

vulnerability-scanningsecurity-scanningOWASPCVE
aj-geddes
aj-geddes
301

vulnerability-scanner

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

vulnerability-scanningowaspsupply-chain-securityattack-surface-mapping
xenitV1
xenitV1
10917

repomix-safe-mixer

Safely package codebases with repomix by automatically detecting and removing hardcoded credentials before packing. Use when packaging code for distribution, creating reference packages, or when the user mentions security concerns about sharing code with repomix.

static-analysiscredentials-managementvulnerability-scanningrelease-workflow
daymade
daymade
15713

onvifscan

ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices.

authentication-testingbrute-forceiot-devicesonvif
BrownFineSecurity
BrownFineSecurity
47984

nmap

Professional network reconnaissance and port scanning using nmap. Supports various scan types (quick, full, UDP, stealth), service detection, vulnerability scanning, and NSE scripts. Use when you need to enumerate network services, detect versions, or perform network reconnaissance.

reconnaissancenetwork-scanningvulnerability-scanningservice-detection
BrownFineSecurity
BrownFineSecurity
47984

iotnet

IoT network traffic analyzer for detecting IoT protocols and identifying security vulnerabilities in network communications. Use when you need to analyze network traffic, identify IoT protocols, or assess network security of IoT devices.

iot-devicesnetwork-protocolsprotocol-analysispacket-capture
BrownFineSecurity
BrownFineSecurity
47984

WordPress Penetration Testing

This skill should be used when the user asks to "pentest WordPress sites", "scan WordPress for vulnerabilities", "enumerate WordPress users, themes, or plugins", "exploit WordPress vulnerabilities", or "use WPScan". It provides comprehensive WordPress security assessment methodologies.

wordpresspenetration-testingvulnerability-scanningwpscan
zebbern
zebbern
2,951263

Security Scanning Tools

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware", "check cloud security", or "evaluate system compliance". It provides comprehensive guidance on security scanning tools and methodologies.

vulnerability-scanningnetwork-scanningweb-application-securitymalware-detection
zebbern
zebbern
2,951263

Page 2 of 2 · 36 results