AIエージェントの能力を拡張するClaudeスキルの完全なコレクションをご覧ください。
Identifies and remediates exposed secrets, API keys, and credentials within codebases using pattern matching and entropy analysis.
Automates the integration of enterprise-grade secrets managers like HashiCorp Vault and AWS Secrets Manager into your infrastructure and application code.
Conducts comprehensive security audits of codebases to identify vulnerabilities like SQL injection, XSS, and insecure dependencies.
Performs comprehensive security audits to identify code vulnerabilities and provide detailed remediation guidance.
Generates comprehensive security audit reports and vulnerability assessments to improve system security posture and compliance.
Generates comprehensive security audit reports and vulnerability assessments to improve system posture and ensure regulatory compliance.
Analyzes HTTP security headers to identify vulnerabilities and provide actionable recommendations for website hardening.
Analyzes HTTP security headers to identify vulnerabilities and provides actionable recommendations for improving website security posture.
Guides users through the complete security incident response lifecycle, from initial threat classification to remediation and post-incident reporting.
Guides teams through the security incident response lifecycle by automating classification, playbook generation, and remediation planning.
Identifies potential security vulnerabilities and compliance issues within infrastructure-as-code and application configuration files.
Identifies and remediates security vulnerabilities in infrastructure-as-code and application configuration files.
Conducts comprehensive security audits, vulnerability assessments, and compliance reviews for code and infrastructure.
Performs comprehensive security audits and compliance checks for codebases, infrastructure configurations, and cryptographic implementations.
Automates security vulnerability scans and penetration testing to identify OWASP Top 10 flaws, injection vulnerabilities, and authentication issues.
Automates security vulnerability scanning and penetration testing for applications and APIs to identify OWASP Top 10 flaws.
Classifies the emotional tone of text data to identify positive, negative, and neutral sentiments in customer feedback and social media.
Analyzes the emotional tone and polarity of text data to provide insights into customer feedback and public opinion.
Automates the generation of production-ready Istio and Linkerd configurations for microservices architectures.
Analyzes codebase session management to identify vulnerabilities and ensure compliance with security best practices.
Analyzes session management implementations to identify security vulnerabilities and ensure compliance with best practices.
Defines and monitors Service Level Agreements (SLAs), Indicators (SLIs), and Objectives (SLOs) to ensure high system reliability and performance.
Executes automated smoke tests to verify critical application functionality and system health instantly.
Executes critical smoke test suites to verify application health, authentication, and core functionality instantly.
Manages and updates snapshot tests across major JavaScript frameworks using intelligent diff analysis to distinguish intentional changes from regressions.
Streamlines SOC2 audit preparation by automating evidence gathering, security control analysis, and compliance gap reporting.
Automates SOC2 evidence gathering and compliance gap analysis to streamline the audit preparation process.
Detects and remediates SQL injection vulnerabilities within your codebase to ensure robust application security.
Detects and remediates SQL injection vulnerabilities by analyzing codebases for potential security flaws and providing actionable fix guidance.
Identifies and remediates SQL injection vulnerabilities within codebases to enhance application security and data integrity.
Scroll for more results...