Discover Agent Skills for security & testing. Browse 105skills for Claude, ChatGPT & Codex.
Analyzes complex scenarios through a legal lens using statutory interpretation, case law, and regulatory frameworks to assess liability and compliance.
Generates and executes behavior-driven test scenarios for CLI, TUI, Web, and Electron applications using AI agents.
Generates comprehensive test suites and improves code coverage using Test-Driven Development (TDD) principles.
Analyzes software and infrastructure through the lens of cybersecurity using industry-standard threat modeling and risk-based frameworks.
Enables interactive, natural language debugging sessions using the Debug Adapter Protocol (DAP) and MCP integration.
Accelerates decentralized finance development with production-ready smart contract templates for staking, AMMs, governance, and lending.
Implements production-grade Kubernetes security policies including NetworkPolicy, RBAC, and Pod Security Standards to harden cluster infrastructure.
Optimizes web fuzzing and security reconnaissance using FFUF for directory discovery and authenticated API testing.
Enforces a rigorous verification protocol with evidence-based checklists to ensure tasks are fully completed and validated before submission.
Orchestrates end-to-end codebase reviews using parallel agents to identify technical debt, create GitHub issues, and generate automated pull requests.
Implements a rigorous, hypothesis-driven scientific method to solve complex software bugs and architectural challenges.
Enforces a rigorous verification workflow requiring empirical evidence before any task is marked as complete or successful.
Executes domain-weighted multi-agent voting to validate critical decisions in security, authentication, and data architecture.
Automates the generation and improvement of comprehensive test suites following TDD principles to ensure high-quality, bug-free code.
Reconstructs source code from compiled binaries with a focus on achieving byte-for-byte identical output and exact functional parity.
Implements robust compression encoders and entropy coders by mathematically deriving operations from existing decoder state machines to ensure bit-perfect compatibility.
Identifies and removes sensitive credentials, API keys, and private tokens from git repositories and version control history.
Generates multiple independent implementations of critical code and selects the optimal solution through systematic comparison.
Systematizes LLM output evaluation using multi-dimensional rubrics, LLM-as-judge patterns, and statistical variance handling.
Implements programmatic terminal interfaces to control interactive shell sessions and automate command-line program interactions.
Streamlines the complex build process of the CompCert formally verified C compiler by managing Coq and OCaml dependency versioning.
Conducts deep security audits and threat modeling using industry-standard frameworks to harden applications and infrastructure.
Provides comprehensive guidance for building the formally verified CompCert C compiler from source while managing strict dependency versions and memory constraints.
Extracts and cracks password hashes from encrypted 7z archives using specialized tools and systematic attack strategies.
Identifies, analyzes, and patches security flaws and CWE-classified vulnerabilities using a systematic workflow and thorough test-driven verification.
Implements robust Python asyncio task cancellation and signal handling patterns to ensure graceful shutdowns and proper resource cleanup.
Translates legacy COBOL programs into modern programming languages while ensuring functional equivalence and byte-level output compatibility.
Analyzes and exploits vulnerable executables to extract hidden flags, secrets, and cryptographic keys using static and dynamic analysis techniques.
Diagnoses and resolves memory management issues, pointer arithmetic bugs, and runtime corruption within the OCaml garbage collector.
Implements rigorous differential cryptanalysis attacks to recover keys from FEAL and similar weak Feistel block ciphers.
Scroll for more results...