Security

Security skills for audits, auth flows, vulnerability detection, and compliance checks in AI-assisted development.

This directory brings installable AI Agent skills into one place so you can filter by search, category, topic, and official source, then install them directly into Claude Code, Cursor, Windsurf, and other supported environments.

293 verfügbare skills

op

Logo of underwear
underwear

Manage 1Password secrets. Use when user wants to list, get, or read passwords, OTP codes, API keys, or other secrets from 1Password.

0
0
Entwickler

github

Logo of sepivip
sepivip

GitHub ist eine Plattform für kollaborative Entwicklung, die es Entwicklern ermöglicht, über die REST-API mit Repositories und Issues zu interagieren

0
0
Entwickler

native-data-fetching

Logo of Liinkiing
Liinkiing

Use when implementing or debugging mobile/native network requests, API calls, or data fetching. Covers fetch API, auth/session flows, error handling, caching strategies, and offline support. For GraphQL use graphql-frontend; for existing frontend REST code follow the repos Axios service layer.

0
0
Entwickler

tinman

Logo of Niraven
Niraven

Security auditing and hardening for OpenClaw and system infrastructure.

0
0
Entwickler

erc4337-privacy-wallet

Logo of mashharuki
mashharuki

Privacy-preserving ERC-4337 wallet development for vehicle identity and sensitive data protection. Use when implementing ERC-4337 account abstraction wallets that handle sensitive information (vehicle license plates, biometric data, personal IDs) requiring on-chain privacy. Triggers on requests like implement ERC-4337 wallet for vehicle, create privacy-protected account abstraction, build wallet with vehicle number privacy, develop ERC-4337 with ZK proof integration, or any smart contract wallet development requiring commitment schemes, deterministic address generation, and sensitive data protection.

0
0
Entwickler

wordpress-pro

Logo of ErickAguilar95
ErickAguilar95

Use when developing WordPress themes, plugins, customizing Gutenberg blocks, implementing WooCommerce features, or optimizing WordPress performance and security.

0
0
Entwickler

Authorization Matrix

Logo of cdalsoniii
cdalsoniii

Build and verify an authorization matrix mapping roles to endpoints — detect unprotected routes, missing ownership checks, and scope misconfigurations

0
0
Entwickler

commit-feature

Logo of Vulnetix
Vulnetix

Stage changes, create conventional commit (no co-author), push to origin, and add detailed PR comment with session context

0
0
Entwickler

api

Logo of jvidalv
jvidalv

Use when working on the backend API (packages/api). Covers Elysia routes, Drizzle ORM, TypeBox schemas, JWT authentication, S3 uploads, Google Sheets logging, and the Next.js hybrid setup.

0
0
Entwickler

sm-configure

Logo of dchuk
dchuk

Use when configuring SourceMonitor engine settings via the DSL, including queue settings, HTTP client, fetching, health, scrapers, retention, scraping controls, events, model extensions, realtime, and authentication.

0
0
Entwickler

backend-patterns

Logo of netkenny1
netkenny1

Backend architecture patterns, API design, Node.js/Express server patterns, security headers, rate limiting, and server-side best practices. Use when building or modifying server.js, API routes, or backend logic.

0
0
Entwickler

cli

Logo of zzstoatzz
zzstoatzz

Use the pdsx CLI for ATProto record operations. Requires auth for writes, supports batch operations via stdin.

0
0
Entwickler