Discover Agent Skills for security & testing. Browse 105skills for Claude, ChatGPT & Codex.
Designs and implements secure storage, rotation, and lifecycle patterns for credentials, API keys, and certificates.
Implements proactive resilience testing through controlled fault injection experiments to discover system weaknesses before they cause outages.
Implements comprehensive unit testing and TDD patterns for shell scripts using the Bash Automated Testing System (Bats).
Automates and secures Claude Code workflows using event-driven hooks for tool validation and session management.
Implements formal specification-driven development using Quint to model state machines and verify system invariants before writing implementation code.
Provides comprehensive guidance and implementation patterns for building GDPR-compliant data systems and privacy controls.
Implements the eXtreme Programming Red-Green-Refactor workflow to ensure code correctness and maintainability across multiple programming languages.
Provides a standardized skill template used for validating and testing Claude Code plugin integrations.
Enforces a rigorous Test-Driven Development (TDD) methodology through the Red-Green-Refactor-Commit cycle for high-quality software delivery.
Ensures derivative software projects adhere to Apache License 2.0 requirements for attribution, documentation, and redistribution.
Provides a malformed skill configuration to test naming convention validation and linting logic within Claude Code.
Audits and optimizes Neovim configurations by detecting deprecated APIs, validating best practices, and performing health checks.
Develops comprehensive security testing strategies including OWASP alignment, penetration test scoping, and automated SAST/DAST integration.
Provides comprehensive architectural guidance and implementation patterns for RBAC, ABAC, ACL, and ReBAC permission systems.
Facilitates comprehensive testing for Holochain applications using Tryorama through multi-agent simulations, performance benchmarking, and complex economic workflow validation.
Enforces integration testing against real local services like databases, caches, and queues to catch bugs that mocks miss.
Implements security controls and regulatory patterns for SOC 2, GDPR, HIPAA, and other SaaS compliance frameworks.
Performs comprehensive security audits, threat modeling, and SLSA compliance checks to ensure production-grade software security.
Performs expert-level security audits, vulnerability assessments, and compliance mapping using industry standards like OWASP and CVSS v3.1.
Interprets CodeQL SARIF outputs to identify, validate, and remediate complex security vulnerabilities through deep semantic dataflow analysis.
Orchestrates multi-layer validation pipelines across proofs, specifications, types, contracts, and tests to ensure rigorous software correctness.
Implements zero-trust security principles including ZTNA, micro-segmentation, and identity-first access for cloud-native applications.
Architects optimized test distribution strategies and identifies testing anti-patterns to ensure fast, reliable development pipelines.
Conducts mandatory OWASP-aligned security audits for sensitive code changes involving authentication, APIs, and databases.
Maintains and enhances existing skill packs through systematic domain analysis, structural reviews, and behavioral gauntlet testing using subagents.
Enforces strict compliance standards by blocking pull request creation until all code review requirements and security checks are satisfied.
Implements comprehensive software testing architectures using TDD methodology, the test pyramid, and automated validation patterns.
Conducts comprehensive security audits for backend systems to identify vulnerabilities in authentication, encryption, and access control.
Diagnoses and resolves complex kernel memory issues including page faults, double faults, and allocator failures within the Breenix operating system.
Implements secure coding standards and OWASP-aligned patterns to protect applications from vulnerabilities like SQL injection, XSS, and broken authentication.
Scroll for more results...