convex-security-audit
Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations
Browse and install thousands of AI Agent skills in the Killer-Skills directory. Supports Claude Code, Windsurf, Cursor, and more.
Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations
Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations
ci is a skill that automates the testing pipeline for Rails applications, incorporating security scans and style checks.
Security auditing and hardening for OpenClaw and system infrastructure.
Apply modern web development best practices for security, compatibility, and code quality. Use when asked to apply best practices, security audit, modernize code, code quality review, or check for vulnerabilities.
package-json-maintenance is a skill that manages JavaScript package maintenance tasks in an isolated worktree, supporting various package managers and automating security audits and dependency updates.
Automates Supabase workflows including migrations, type synchronization, and schema security audits. Use when creating new database tables, updating schemas, or ensuring RLS compliance.
security-auditor is a specialized AI agent skill for expert security auditing, focusing on DevSecOps, application security, and comprehensive cybersecurity practices.
This skill provides guidance for implementing security features that span across Better Auth, including rate limiting, CSRF protection, session security, trusted origins, secret management, OAuth secu
Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level (public, admi
Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level (public, admi
Comprehensive security vulnerability analysis for codebases and infrastructure. Scans dependencies (npm, pip, gem, go, cargo), containers (Docker, Kubernetes), cloud IaC (Terraform, CloudFormation), a