🔒Security Operations Skills

Browse skills in the Security Operations category.

Cloudflare Turnstile

jezweb's avatarfrom jezweb

A powerful skill for Claude agents.

[Security Operations]

Red Team Tactics

sickn33's avatarfrom sickn33

A powerful skill for Claude agents.

[Security Operations]

Firebase Apk Scanner

trailofbits's avatarfrom trailofbits

A powerful skill for Claude agents.

[Security Operations]

Vulnerability Scanner

sickn33's avatarfrom sickn33

A powerful skill for Claude agents.

[Security Operations]

Burpsuite Project Parser

trailofbits's avatarfrom trailofbits

A powerful skill for Claude agents.

[Security Operations]

Semgrep Rule Creator

trailofbits's avatarfrom trailofbits

A powerful skill for Claude agents.

[Security Operations]

penetration-testing

timsonner's avatarfrom timsonner

Comprehensive penetration testing workflow using Kali Linux tools via MCP. Guides agents through reconnaissance, vulnerability assessment, exploitation, privilege escalation, and reporting. Use when conducting security assessments, CTF challenges, vulnerability testing, or red team exercises.

[Security Operations]

dependencies

danielscholl-osdu's avatarfrom danielscholl-osdu

Multi-ecosystem dependency analysis tools. Provides structured data for vulnerability scanningand version checking. The AI applies intelligence to create rich reports - scripts are data providers only.Supports Maven projects (pom.xml), with Python and Node.js support planned.

[Security Operations]

security-scan

benjaminshoemaker's avatarfrom benjaminshoemaker

Scan for security vulnerabilities in dependencies, code patterns, and secrets. Detects tech stack automatically and runs appropriate tools.

[Security Operations]

azure-osdu

danielscholl-osdu's avatarfrom danielscholl-osdu

Queries OSDU users and entitlements via the OSDU Entitlements API. Use when listing OSDU users, checking roles (Viewer, Editor, Admin, Ops), resolving GUIDs to names, or troubleshooting OSDU access.

[Security Operations]

1password-secrets

terraphim's avatarfrom terraphim

Secure secret management with 1Password CLI: detect secrets, generate templates, inject secrets, and audit compliance.

[Security Operations]

vibe-auditor

Rahat-ch's avatarfrom Rahat-ch

Security auditor for vibe-coded projects. Automatically triggered when working with security-sensitive files or detecting risky code patterns.

[Security Operations]

security-checker

edri2or-commits's avatarfrom edri2or-commits

Validates that no secrets or sensitive data are being committed to the repository

[Security Operations]

security-auditor

gregsuptown's avatarfrom gregsuptown

Scan for OWASP Top 10 vulnerabilities and security best practices. Checks for SQL injection, XSS, authentication issues, sensitive data exposure, and other common security risks.

[Security Operations]

security-hardener

ainexllc's avatarfrom ainexllc

Implement security headers, input validation, and CSRF protection. Use when hardening security, reviewing for vulnerabilities, or before releases.

[Security Operations]

security-hardening

stkhr's avatarfrom stkhr

OWASP Top 10に準拠したセキュアなコード実装を支援。入力検証、認証・認可、セキュアなエラーハンドリング、SQL/XSS/CSRF対策などのセキュリティ強化を実施。「セキュリティチェック」「脆弱性スキャン」「OWASP準拠」などの指示で起動。

[Security Operations]

security-scanner

eddiebe147's avatarfrom eddiebe147

Scan code and infrastructure for security vulnerabilities and compliance issues

[Security Operations]

security

tomas-u's avatarfrom tomas-u

Expert security architect providing comprehensive security guidance, architecture assessments, threat modeling, and compliance verification. Follows OWASP, NIS2, ISO 27001, NIST, and industry best practices. Use for security architecture design and review, threat modeling, security strategy, compliance assessment (OWASP, NIS2, GDPR, PCI DSS, SOC 2), infrastructure security, API security patterns, and incident response planning. For code-level security reviews, use the code-review skill.

[Security Operations]

security-github-review

oopsyz's avatarfrom oopsyz

Security review workflow for GitHub repositories using the Security MCP (OWASP ASVS + NIST 800-53) as the primary reference and mapping layer. Use when asked to security review a repo, produce an OWASP/NIST-aligned checklist, map findings to ASVS/NIST controls, generate a prioritized vulnerability report, or create security requirements/acceptance criteria from repo code/config.

[Security Operations]

security-review

aimskr's avatarfrom aimskr

보안, 보안 리뷰, 보안 검토, 취약점, 보안 분석 - Use when reviewing code for security vulnerabilities, designing authentication/authorization, or ensuring secure architecture. Provides systematic security analysis based on OWASP guidelines.

[Security Operations]

security

travisjneuman's avatarfrom travisjneuman

Information security expertise for cybersecurity frameworks (NIST, ISO 27001), security architecture, incident response, vulnerability management, identity management, and cloud security. Use when designing security programs, responding to incidents, or assessing vulnerabilities.

[Security Operations]

trivy

mauromedda's avatarfrom mauromedda

Security vulnerability scanner using Trivy for container images, filesystems, and IaC. Blocks CRITICAL and HIGH severity vulnerabilities before commit. Triggers on "trivy", "vulnerability scan", "security scan", "container scan", "image scan", "sbom", "cve", "dependency scan", "supply chain security", "docker scan", "scan image", "scan container", "check vulnerabilities", "security check", "license scan", "secret scan", "misconfig scan", "iac scan", "terraform scan", "kubernetes scan", "helm scan", "dockerfile scan", "package vulnerabilities", "npm audit", "pip audit", "go mod vulnerabilities", "scan dependencies", "security gate", "compliance scan", "aqua trivy". PROACTIVE: MUST invoke before committing code with new dependencies or container images.

[Security Operations]

auth-security

majiayu000's avatarfrom majiayu000

OAuth 2.1 + JWT authentication security best practices. Use when implementing auth, API authorization, token management. Follows RFC 9700 (2025).

[Security Operations]

pact-security-patterns

v4lheru's avatarfrom v4lheru

CROSS-CUTTING: Security patterns and best practices for ALL PACT phases.Provides OWASP Top 10 guidance, authentication/authorization patterns, input validation,secure coding practices, secrets management, and security testing checklists.Use when: implementing authentication, handling user input, storing secrets,designing authorization, reviewing code for vulnerabilities, planning security tests.

[Security Operations]

security-auditor

Eigo-Mt-Fuji's avatarfrom Eigo-Mt-Fuji

security-auditor skillTrigger terms: security audit, vulnerability scan, OWASP, security analysis, penetration testing, security review, threat modeling, security best practices, CVEUse when: User requests involve security auditor tasks.

[Security Operations]

security-guidance

v1truv1us's avatarfrom v1truv1us

Comprehensive security best practices, vulnerability scanning, and security guidance for development workflows with automated security checks and compliance monitoring.

[Security Operations]

secure-code-guardian

franroa's avatarfrom franroa

Security expert for writing secure code and preventing vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 10 prevention. Keywords: security, authentication, authorization, OWASP, encryption, vulnerability.

[Security Operations]

sonarcloud-security-triage

NASA-PDS's avatarfrom NASA-PDS

Apply triage decisions to SonarCloud security issues by reading a CSV with review decisions and updating issue/hotspot statuses via the SonarCloud API. Use when the user has reviewed security issues and wants to bulk-update SonarCloud with their triage decisions.

[Security Operations]

security-shield

monicajeon28's avatarfrom monicajeon28

**SECURITY SHIELD**: '보안', '인증', '로그인', '비밀번호', 'JWT', '토큰', '암호화', '취약점', 'SQL 인젝션', 'XSS', '보안 검사' 요청 시 자동 발동. .env/auth/**/guard/** 파일 작업 시 자동 적용. 하드코딩 시크릿 탐지(40+ 패턴), OWASP Top 10 검증.

[Security Operations]

1password

HarleyCoops's avatarfrom HarleyCoops

Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.

[Security Operations]

security-auditor

ref-docs's avatarfrom ref-docs

security-auditor skillTrigger terms: security audit, vulnerability scan, OWASP, security analysis, penetration testing, security review, threat modeling, security best practices, CVEUse when: User requests involve security auditor tasks.

[Security Operations]

do-platform-auth0

yejune's avatarfrom yejune

Auth0 보안 전문가로서 공격 방어, 다중 인증, 토큰 보안, 발신자 제약(DPoP/mTLS), 규정 준수(FAPI, GDPR, HIPAA)를 다룸. Auth0 보안 기능 구현, MFA 설정, 토큰 보안, 규정 요구사항 충족 시 사용.

[Security Operations]

security-audit

a-jay85's avatarfrom a-jay85

Security vulnerability detection and remediation for XSS and SQL injection in IBL5 PHP code. Use when auditing security, fixing vulnerabilities, or reviewing code for security issues.

[Security Operations]

security-auditor

sidetoolco's avatarfrom sidetoolco

Review code for vulnerabilities, implement secure authentication, and ensure OWASP compliance. Handles JWT, OAuth2, CORS, CSP, and encryption. Use PROACTIVELY for security reviews, auth flows, or vulnerability fixes.

[Security Operations]

identity-hub

gravito-framework's avatarfrom gravito-framework

Expert in Identity and Access Management (IAM). Trigger this when implementing Login, Auth, RBAC, or Multi-tenancy logic.

[Security Operations]

neon-db-security-check

AppleLamps's avatarfrom AppleLamps

Review Neon (Postgres) project security posture using project details like roles/users, connection strings, branches, IP allowlists, integrations, and schema info. Use when asked to identify misconfigurations, rate severity, and produce a prioritized hardening checklist with exact SQL and Neon settings remediation steps.

[Security Operations]

fortify-security

gravito-framework's avatarfrom gravito-framework

Expert in Gravito security and authentication. Trigger this when setting up Auth, configuring CSP, or implementing security middleware.

[Security Operations]

rbac-validator

markus41's avatarfrom markus41

Validates role-based access control (RBAC) implementation for four-tier permissions in the NABIP AMS (Member, Chapter Admin, State Admin, National Admin). Use when implementing permission checks, RLS policies, UI access controls, or audit logging for multi-tenant association management.

[Security Operations]

sovereign

matt-fell-ai's avatarfrom matt-fell-ai

Performs privacy audits and data sovereignty checks. USE WHEN you want to ensure your private data is not being leaked to external providers.

[Security Operations]

system-architect

liauw-media's avatarfrom liauw-media

Use when performing security audits or system hardening. Teaches security assessment principles and prioritization.

[Security Operations]

sonarcloud-security-audit

NASA-PDS's avatarfrom NASA-PDS

Audit SonarCloud security issues (vulnerabilities and hotspots) for NASA PDS repositories and export to CSV for triage. Use when the user requests SonarCloud security scans, vulnerability reports, or security audits for PDS projects.

[Security Operations]

security

PROLE-ISLAND's avatarfrom PROLE-ISLAND

セキュリティ監査スキル。OWASP Top 10チェック・依存関係脆弱性・機密情報検出を実行

[Security Operations]

security

veerababumanyam's avatarfrom veerababumanyam

Security and data protection guidelines for RawDrive. Use when implementing authentication, handling user data, validating inputs, or reviewing security-sensitive code.

[Security Operations]

nextjs-security

Ai-Whisperers's avatarfrom Ai-Whisperers

Next.js 15 security patterns for veterinary platforms including Server Action hardening, CSRF protection, rate limiting, RLS policy generation, and auth middleware. Use when building or auditing security features.

[Security Operations]

security-management

DataKnifeAI's avatarfrom DataKnifeAI

Manage security policies and access controls for Protect surveillance. Monitor access to recordings and system settings to ensure only authorized personnel have appropriate access.

[Security Operations]

senhasegura-skill

julianobarbosa's avatarfrom julianobarbosa

Comprehensive senhasegura PAM platform skill for secrets management, credential vaulting, SSH key rotation, and DevOps secrets integration. Use when working with senhasegura A2A APIs, DSM CLI, MySafe, credential management, password rotation, External Secrets Operator integration, or any senhasegura PAM operations.

[Security Operations]

security-audit

cpa03's avatarfrom cpa03

Procedure for analyzing code or dependencies for vulnerabilities

[Security Operations]

security-auditor

Spectaculous-Code's avatarfrom Spectaculous-Code

Comprehensive Supabase security auditor for RLS policies, table privileges (GRANTs), and access control validation.Use when:- Auditing database security (RLS + GRANTs)- Generating access matrix (who can SELECT/INSERT/UPDATE/DELETE which tables)- Finding security gaps (missing RLS, overly permissive GRANTs)- Validating PostgREST access patterns- Creating security documentation for Docs/context/- Creating RLS policies for new or existing tables- Validating user data protection- Checking admin access patterns- Identifying security vulnerabilitiesTriggers: "security audit", "access matrix", "who can update", "missing RLS", "check grants", "security gaps", "table permissions", "RLS policy", "row level security", "validate security", "user data protection", "admin access"

[Security Operations]

security-check

alexanderjamesmcleod's avatarfrom alexanderjamesmcleod

Security audit, vulnerability scanning, and secrets detection for comprehensive application security

[Security Operations]

security-review

place-to-stand's avatarfrom place-to-stand

Perform OWASP Top 10 security audit, check auth/authz guards, find injection vulnerabilities, and identify data exposure. Use when reviewing security-sensitive code, before merging auth changes, or when asked to check for vulnerabilities.

[Security Operations]
← Back to All Skills