Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Enforces rigorous, evidence-based verification protocols before any task is marked as complete or committed to a repository.
Enforces a strict Red-Green-Refactor workflow to ensure all production code is verified by failing automated tests before implementation.
Enforces a rigorous, four-phase methodology to identify root causes and implement reliable fixes for software defects.
Identifies and tests GraphQL API denial-of-service vulnerabilities through recursive nesting and query complexity analysis.
Enforces a strict Red-Green-Refactor cycle to ensure code reliability and high-quality software design.
Secures Docker environments by implementing CIS Benchmark standards and industry-leading container hardening practices.
Triages web application vulnerability findings from DAST and SAST scanners using the OWASP Risk Rating Methodology to prioritize remediation efforts.
Automates the deployment and management of MISP to aggregate, correlate, and distribute threat intelligence feeds across security infrastructures.
Implements Google's BeyondCorp zero trust security model to replace traditional VPNs with identity-aware, context-based access controls.
Automates data privacy, GDPR compliance, and retention policies for Gamma integrations.
Configures role-based access control, SSO integration, and credit-based budget management for Ideogram AI image generation.
Audits web application HTTP response headers to identify missing or misconfigured security protections like CSP, HSTS, and Secure cookies.
Optimizes fuzzer performance by providing domain-specific tokens to guide parsers and protocol handlers toward deeper code paths.
Implements secure role-based access control and API key management for enterprise Deepgram integrations.
Configures multi-layer Cloudflare security controls to protect web infrastructure from volumetric, protocol, and application-layer DDoS attacks.
Validates cryptographic implementations against a comprehensive library of known attack vectors and edge cases.
Optimizes Retell AI integrations through automated load testing, Kubernetes auto-scaling configurations, and data-driven capacity planning.
Monitors and analyzes Certificate Transparency logs to detect phishing attempts, unauthorized SSL/TLS issuances, and potential brand impersonation.
Automates data export, retention policies, and GDPR/CCPA compliance for Granola meeting transcripts and notes.
Facilitates authorized initial access testing using the EvilGinx3 adversary-in-the-middle framework to bypass multi-factor authentication.
Secures organizational email domains by configuring SPF, DKIM, and DMARC protocols to prevent spoofing and phishing.
Generates high-quality fuzzing harnesses to identify edge-case bugs and security vulnerabilities across multiple programming languages.
Extract embedded configurations and exfiltration credentials from Agent Tesla RAT samples using .NET decompilation and automated string analysis.
Identifies and tracks adversary movement across network environments using specialized Splunk SPL queries and Windows event analysis.
Deploys honeypots, honeytokens, and decoy systems to provide high-fidelity detection of lateral movement and credential abuse.
Implements security guardrails and resource policy enforcement for applications hosted on Replit to prevent data leaks and resource overages.
Analyzes ransomware cryptographic routines to identify encryption algorithms, evaluate implementation weaknesses, and assess decryption feasibility for data recovery.
Detects command-and-control beaconing patterns by performing statistical analysis on Zeek network connection logs.
Identifies unprotected web pages and administrative interfaces to test authentication enforcement during authorized security audits.
Extracts and analyzes Windows LNK shortcut files to reconstruct file access history, identify external media usage, and build forensic timelines.
Scroll for more results...