Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Implements production-grade Kubernetes security policies including NetworkPolicy, RBAC, and Pod Security Standards to ensure cluster-wide defense-in-depth.
Enforces a rigorous four-phase framework to identify root causes and eliminate guess-and-check thrashing during the software debugging process.
Implement robust testing strategies for JavaScript and TypeScript applications using modern frameworks like Jest and Vitest.
Analyzes source code for detectability threats and timing side channels to prevent unauthorized inference of system interactions.
Audits source code for SQL, NoSQL, and command injection vulnerabilities to align with OWASP Top 10 security standards.
Analyzes implementation plans and architecture designs to identify security vulnerabilities before a single line of code is written.
Traces application data from input sources to storage sinks to identify security vulnerabilities and trust boundary violations.
Identifies and remediates hardcoded credentials, API keys, and sensitive tokens across source code and git history.
Simulates realistic exploit chains and scores vulnerability exploitability using the PASTA threat modeling framework.
Analyzes source code to detect and remediate complex concurrency vulnerabilities like TOCTOU, double-spend bugs, and non-atomic operations.
Analyzes source code and data structures to detect PII exposure and re-identification risks in anonymized datasets.
Maps application attack surfaces and technical boundaries to create comprehensive data flow diagrams for threat modeling.
Identifies security weaknesses and maps vulnerabilities to CWE identifiers using the PASTA threat modeling methodology.
Analyzes source code to identify and mitigate linkability threats where user data can be correlated across services, sessions, or contexts.
Performs comprehensive security threat modeling by dispatching parallel subagents to analyze codebases for STRIDE framework vulnerabilities.
Audits source code to identify and mitigate unauthorized personal data (PII) exposure in logs, APIs, and third-party integrations.
Identifies authorization vulnerabilities and privilege escalation paths within your source code using the STRIDE threat modeling framework.
Implements secure Auth0 authentication patterns, including machine-to-machine authorization, user management, and role-based access control.
Strengthens application security by identifying and implementing defense-in-depth measures, security headers, and proactive coding patterns.
Identifies and analyzes potential threats by profiling actors and mapping attack vectors to the MITRE ATT&CK framework using the PASTA methodology.
Teaches application security through interactive, guided walkthroughs using your own codebase as the primary teaching material.
Visualizes the current security posture of a project by aggregating scan results and tracking code changes since the last audit.
Prevents the reintroduction of security vulnerabilities by verifying historical fixes against current code changes.
Analyzes source code to identify and remediate identity spoofing vulnerabilities and authentication weaknesses based on the STRIDE threat model.
Audits application and infrastructure configurations to identify and remediate security vulnerabilities based on OWASP standards.
Analyzes application architecture to identify components, trust boundaries, and data sensitivity for formal threat modeling.
Conducts exhaustive, multi-framework security audits and generates comprehensive, compliance-ready reports.
Maps and inventories every application entry point to identify potential security exposure and undocumented interfaces.
Analyzes code coverage metrics and implements testing patterns to improve software quality and reliability.
Analyzes WebSocket implementations for security vulnerabilities like CSWSH, missing authentication, and inadequate message validation.
Scroll for more results...