Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Systematizes LLM output evaluation using multi-dimensional rubrics, LLM-as-judge patterns, and statistical variance handling.
Executes domain-weighted multi-agent voting to validate critical decisions in security, authentication, and data architecture.
Provides comprehensive guidance for building the formally verified CompCert C compiler from source while managing strict dependency versions and memory constraints.
Enforces a rigorous four-phase scientific methodology to identify root causes and implement stable software fixes without guesswork.
Implements multi-layered data validation across system boundaries to make software bugs structurally impossible.
Implements PCI DSS standards and secure payment card data handling practices to protect sensitive financial information.
Eliminates flaky test behavior by replacing arbitrary timeouts with intelligent condition polling and state verification.
Automates end-to-end testing and browser interaction for local web applications using Playwright and specialized server lifecycle scripts.
Implements robust security patterns and vulnerability prevention techniques for Solidity smart contracts.
Automates and optimizes smart contract testing using Hardhat and Foundry to ensure security and efficiency in blockchain development.
Dispatches a specialized subagent to analyze code implementations against requirements and catch bugs before they cascade.
Performs high-speed web fuzzing and content discovery to identify hidden directories, subdomains, and security vulnerabilities.
Accelerates decentralized finance development with production-ready smart contract templates for staking, AMMs, governance, and lending.
Facilitates high-quality code reviews by providing actionable frameworks for identifying bugs, ensuring architectural consistency, and delivering constructive feedback.
Enforces a rigorous Red-Green-Refactor cycle to ensure every line of production code is verified by a failing test first.
Recovers passwords and sensitive authentication data from disk images, corrupted files, and forensic scenarios using systematic analysis and specialized tools.
Extracts and reconstructs text geometrically encoded within 3D printing or CNC toolpaths by analyzing movement coordinates and extrusion patterns.
Implements production-grade Kubernetes security policies including NetworkPolicy, RBAC, and Pod Security Standards to harden cluster infrastructure.
Generates and verifies self-signed SSL/TLS certificates, private keys, and combined PEM files using OpenSSL command-line tools.
Guides the implementation of differential cryptanalysis attacks to recover round keys from FEAL and similar Feistel-network block ciphers.
Enforces a rigorous verification protocol with evidence-based checklists to ensure tasks are fully completed and validated before submission.
Analyzes software and infrastructure through the lens of cybersecurity using industry-standard threat modeling and risk-based frameworks.
Automates end-to-end testing and visual verification of local web applications using Playwright and TypeScript.
Provides mathematical and procedural guidance for performing linear cryptanalysis attacks on the FEAL cipher family to recover encryption keys.
Generates source code that compiles and executes correctly as both Rust and C or C++ by utilizing comment syntax differences and preprocessor directives.
Guides the construction of induction proofs in the Coq proof assistant for mathematical properties like addition commutativity and arithmetic lemmas.
Extracts passwords and sensitive information from disk images, deleted files, and binary fragments using systematic digital forensic techniques.
Conducts systematic, checklist-based code reviews to identify security vulnerabilities, type safety issues, and performance bottlenecks before you commit.
Validates and optimizes Claude Code plugins by detecting deprecated patterns, verifying frontmatter, and ensuring compliance with the latest platform standards.
Performs threat-aware code audits and vulnerability assessments using industry-standard frameworks like OWASP and STRIDE.
Scroll for more results...