Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Automates IDA Pro binary analysis and reverse engineering tasks using modern IDAPython scripting patterns.
Protects LLM applications by detecting and filtering prompt injections and jailbreak attempts with high precision.
Moderates LLM inputs and outputs using Meta's specialized LlamaGuard models to ensure safety and policy compliance across six critical categories.
Enforces a strict Red-Green-Refactor workflow by requiring failing tests before any production code implementation.
Conducts comprehensive security audits of codebases to identify OWASP vulnerabilities, hardcoded secrets, and unsafe implementation patterns.
Performs deep security audits and compatibility checks on Pull Requests to prevent malicious code injection and breaking changes.
Streamlines unit and integration testing using the Vitest framework with Vite-native performance and Jest-compatible APIs.
Executes Go unit tests requiring the Spanner emulator by automating environment configuration and lifecycle management.
Automates the Trail of Bits 5-step secure development process for smart contracts, including vulnerability scanning, architectural visualization, and property-based testing setup.
Scans Solana and Anchor programs for critical security vulnerabilities including arbitrary CPI, improper PDA validation, and missing signer checks.
Scans Cairo and StarkNet smart contracts for critical security vulnerabilities including arithmetic overflows, L1-L2 messaging flaws, and signature replay attacks.
Scans Cosmos SDK and CosmWasm codebases for consensus-critical security vulnerabilities, non-determinism, and logic errors.
Evaluates codebase security and maturity using the Trail of Bits 9-category framework to provide actionable risk reports.
Analyzes TON blockchain smart contracts written in FunC to identify critical vulnerabilities in boolean logic, Jetton handling, and gas management.
Conducts independent, multi-model code reviews using OpenAI Codex and Google Gemini CLI to identify bugs, security flaws, and performance issues.
Audits Algorand smart contracts written in TEAL or PyTeal to detect and remediate 11 critical security vulnerabilities.
Scans Substrate and Polkadot pallets for critical security vulnerabilities like arithmetic overflows, panic-driven DoS, and improper origin checks.
Analyzes smart contract codebases to provide security-focused architectural reviews and development guidance based on Trail of Bits' best practices.
Diagnoses and troubleshoots the Buttercup Cyber Reasoning System running on Kubernetes clusters.
Analyzes smart contract token implementations and integrations to identify security vulnerabilities and non-standard ERC20/ERC721 behaviors.
Prepares codebases for professional security reviews by automating static analysis, optimizing test coverage, and generating architectural documentation.
Identifies critical fail-open vulnerabilities where applications run with insecure default configurations instead of crashing safely.
Guides the creation of high-performance, precision YARA-X rules for malware detection and security auditing.
Performs comprehensive web application security audits by intercepting, analyzing, and modifying HTTP traffic using Burp Suite's professional toolset.
Conducts comprehensive security audits to identify, exploit, and remediate client-side injection vulnerabilities in web applications.
Conducts systematic security audits to identify and mitigate Insecure Direct Object Reference (IDOR) vulnerabilities in web applications and APIs.
Identifies and tests for directory traversal vulnerabilities to ensure secure filesystem access in web applications.
Automates reconnaissance, vulnerability discovery, and security auditing using industry-standard red team methodologies.
Analyzes network traffic, captures packets, and troubleshoots connectivity using advanced Wireshark filtering and protocol analysis techniques.
Conducts comprehensive SSH security assessments including enumeration, credential testing, and vulnerability exploitation.
Scroll for more results...