Real-time security audit skill scanning for OWASP Top 10 vulnerabilities and infrastructure misconfigurations.
Security & Compliance Skills
16 skills available with current filters
The Agent Skill Source directory is architected into three primary discovery layers: Outcome-based Categories (what you want to achieve), Runtime Compatibility (where the agent runs), and Execution Strategy (how the skill is processed). To find the most reliable capabilities, use the Highest Rated sort and filter by Verified trust levels.
Comprehensive command reference for penetration testing tools, enabling quick lookup during security assessments.
Analyze frontend code for XSS vulnerabilities, providing detailed reports, fix recommendations, and prevention checklists for React, Vue, Angular, and vanilla JavaScript.
Test for directory traversal vulnerabilities to read arbitrary files on the server, potentially including sensitive configuration files and credentials.
Assess software systems for compliance with GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards, providing audits and implementation guidance.
Construct attack trees to visualize threat paths, identify defense gaps, and communicate security risks effectively to stakeholders.
A comprehensive checklist for planning, executing, and following up on penetration tests, ensuring thorough preparation and effective remediation.
Derive actionable security requirements from threat models and business context for user stories, test cases, and compliance.
Comprehensive techniques for attacking Microsoft Active Directory environments, covering reconnaissance, credential harvesting, and privilege escalation.
Comprehensive skill for detecting, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Expert in embedded systems and IoT security, specializing in firmware analysis, reverse engineering, and vulnerability research for various devices.
Comprehensive techniques for escalating privileges on compromised Linux and Windows systems, essential for penetration testing and red team operations.
Comprehensive techniques for identifying and exploiting privilege escalation paths on Linux systems, enabling elevation to root access.
Understand and apply anti-reversing, obfuscation, and protection techniques for software analysis with authorization.
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls for comprehensive security.
Expert in secure frontend coding practices, specializing in XSS prevention, output sanitization, and client-side security patterns.
Discover New Skills Weekly
Stay ahead of the curve with the latest AI agent skills. Get curated recommendations and expert insights delivered directly to your inbox.