Real-time security audit skill scanning for OWASP Top 10 vulnerabilities and infrastructure misconfigurations.
Security Skills
29 skills available with current filters
The Agent Skill Source directory is architected into three primary discovery layers: Outcome-based Categories (what you want to achieve), Runtime Compatibility (where the agent runs), and Execution Strategy (how the skill is processed). To find the most reliable capabilities, use the Highest Rated sort and filter by Verified trust levels.
Orchestrates AI agents for sophisticated debugging and automated resolution of production issues using modern AI tools and observability platforms.
Analyzes keyword usage in provided content, calculates density,
Comprehensive command reference for penetration testing tools, enabling quick lookup during security assessments.
Expert in event sourcing, CQRS, and event-driven architecture patterns. Masters event store design, projection building, saga orchestration, and eventual consistency patterns. Use PROACTIVELY for event-sourced systems, audit trails, or temporal queries.
Analyze frontend code for XSS vulnerabilities, providing detailed reports, fix recommendations, and prevention checklists for React, Vue, Angular, and vanilla JavaScript.
Manage Apple Notes from the command line to create, view, edit, delete, search, move, and export notes.
Test for directory traversal vulnerabilities to read arbitrary files on the server, potentially including sensitive configuration files and credentials.
Assess software systems for compliance with GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards, providing audits and implementation guidance.
Create production-ready Kubernetes manifests for Deployments, Services, ConfigMaps, and Secrets following best practices and security standards. Use when generating Kubernetes YAML manifests, creating K8s resources, or implementing production-grade Kubernetes configurations.
Construct attack trees to visualize threat paths, identify defense gaps, and communicate security risks effectively to stakeholders.
A comprehensive checklist for planning, executing, and following up on penetration tests, ensuring thorough preparation and effective remediation.
Derive actionable security requirements from threat models and business context for user stories, test cases, and compliance.
Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementing security measures for blockchain applications.
Comprehensive techniques for attacking Microsoft Active Directory environments, covering reconnaissance, credential harvesting, and privilege escalation.
Comprehensive skill for detecting, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Expert in embedded systems and IoT security, specializing in firmware analysis, reverse engineering, and vulnerability research for various devices.
Build security Blue Books for sensitive apps
Azure Blob Storage SDK for Python. Use for uploading, downloading, listing blobs, managing containers, and blob lifecycle.
Control Spotify playback and search from the terminal using spogo or spotify_player.
Capture frames and clips from RTSP/ONVIF cameras for snapshots, clips, and motion event detection.
Comprehensive techniques for escalating privileges on compromised Linux and Windows systems, essential for penetration testing and red team operations.
Set up and use 1Password CLI (op) for secure secret management and authentication.
Comprehensive techniques for identifying and exploiting privilege escalation paths on Linux systems, enabling elevation to root access.
Discover New Skills Weekly
Stay ahead of the curve with the latest AI agent skills. Get curated recommendations and expert insights delivered directly to your inbox.