Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Automates the iterative cycle of identifying coverage gaps, writing focused unit tests, and maintaining code quality through integrated reviews.
Implements secure authentication and authorization systems including JWT, OAuth2, and RBAC using industry-standard security patterns.
Provides systematic methodologies and workflows for identifying, exploiting, and remediating Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Enforces rigorous secure coding practices and automates vulnerability checks using CodeGuard integration to protect applications against OWASP Top 10 threats.
Provides a comprehensive framework for identifying, deobfuscating, and analyzing protected JavaScript code and malware samples.
Implements a disciplined, four-phase debugging methodology to identify root causes and ensure robust, verified technical fixes.
Automates the creation of visual filmstrips and pixel-diff comparisons from browser interaction videos to detect UI regressions.
Identifies and reports security vulnerabilities in code, dependencies, and configurations using automated CVE detection and static analysis.
Scans containerized environments and Kubernetes clusters for vulnerabilities to ensure security compliance and automated threat detection.
Performs automated visual and structural comparisons between web pages using pixel diffing and accessibility tree analysis.
Conducts thorough security assessments of SMTP servers to identify vulnerabilities like open relays, user enumeration, and weak authentication.
Enforces a strict Red-Green-Refactor workflow to ensure high-quality, verified code implementation.
Scans applications and data systems to identify potential GDPR compliance violations and provide actionable remediation guidance.
Evaluates and benchmarks LLM agents using statistical testing, behavioral contracts, and reliability metrics to ensure production readiness.
Protects sensitive information by providing seamless data encryption and decryption capabilities using industry-standard algorithms.
Conducts comprehensive security audits to identify and remediate Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Validates and audits automation workflow JSON files for Power Automate, n8n, Make, and Zapier to ensure deployment readiness.
Provides a comprehensive library of essential penetration testing commands for network scanning, exploitation, and vulnerability assessments.
Performs automated fuzz testing on REST APIs to identify security vulnerabilities, input validation flaws, and edge-case failures.
Identifies security vulnerabilities and misconfigurations in IAM policies, ACLs, and permission systems to ensure robust access management.
Provides a comprehensive library of penetration testing commands and workflows for security professionals using industry-standard tools.
Streamlines SOC 2 audit preparation by automating evidence gathering, Trust Service Criteria assessments, and compliance gap analysis.
Automates the creation and execution of real-world verification plans to ensure code works in production-like environments without mocks.
Enforces a rigorous 8-point quality assurance checklist for every AI-generated code change to ensure architectural consistency and security.
Audits web forms for accessibility, validation, security, and autocomplete compatibility using Playwright automation.
Enforces a strict, evidence-based verification protocol to ensure all code changes, builds, and tests pass before marking tasks as complete.
Analyzes network traffic using Wireshark to troubleshoot connectivity, optimize performance, and investigate security incidents.
Generates and executes comprehensive load testing scripts to validate application performance and identify architectural bottlenecks.
Scans project dependencies for security vulnerabilities, outdated packages, and license compliance across multiple programming languages.
Generates and guides Go testing strategies using a pyramid approach with a focus on in-memory dependencies and 100% coverage for leaf types.
Scroll for more results...