Discover Agent Skills for security & testing. Browse 105 skills for Claude, ChatGPT & Codex.
Analyzes source code to identify and mitigate sensitive data leakage, verbose error messages, and unauthorized information disclosure risks.
Audits source code for cryptographic vulnerabilities, weak encryption algorithms, and insecure secret management based on OWASP standards.
Audits source code for authentication vulnerabilities and session management failures to align with OWASP security standards.
Generates and applies production-ready code fixes for security vulnerabilities and findings identified within your codebase.
Conducts sequential, risk-centric threat modeling using the 7-stage PASTA framework to align security findings with business objectives.
Automates architecture-level threat modeling and STRIDE analysis to identify security gaps and visualize data flows.
Analyzes GraphQL endpoints and schemas for critical security vulnerabilities like introspection leaks, depth abuse, and missing authorization.
Analyzes WebSocket implementations for security vulnerabilities like CSWSH, missing authentication, and inadequate message validation.
Generates comprehensive security reports from vulnerability findings, scanner results, and analysis data.
Explains complex security frameworks, vulnerability categories, and specific findings using real-world examples from your own codebase.
Analyzes source code for repudiation threats by identifying missing audit logs, insufficient event tracking, and log tampering vulnerabilities.
Automates Ark Dashboard UI testing and screenshot generation for pull requests using Playwright and Kubernetes.
Analyzes application architecture to identify components, trust boundaries, and data sensitivity for formal threat modeling.
Identifies and remediates common security vulnerabilities and penetration testing findings within the Ark framework.
Analyzes source code to identify security logging failures, sensitive data exposure in logs, and improper monitoring configurations.
Analyzes codebases for the SANS/CWE Top 25 most dangerous software weaknesses to identify and fix critical security vulnerabilities.
Secures applications by identifying file upload vulnerabilities like path traversal, zip slip, and missing server-side validation.
Analyzes REST and RPC APIs for security vulnerabilities aligned with the OWASP API Security Top 10.
Streamlines CVE research and automates security patch workflows for the Ark agentic resource platform.
Analyzes source code to identify and remediate broken access control vulnerabilities including IDOR, CORS leaks, and privilege escalation.
Validates security remediations by re-running scanners and performing deep AI code analysis to confirm vulnerabilities are fully resolved.
Analyzes source code to identify and remediate identity spoofing vulnerabilities and authentication weaknesses based on the STRIDE threat model.
Executes and authors end-to-end tests for Ark agentic resources using the Chainsaw testing framework.
Enriches security findings by mapping vulnerabilities to the MITRE ATT&CK framework to visualize threat patterns and attack chains.
Generates intelligent, context-aware fuzz test inputs and security test cases by analyzing application input parsers and data handlers.
Evaluates Hedera hackathon projects against official judging criteria to provide weighted scores and actionable codebase improvements.
Analyzes codebase architecture, tech stacks, and data sensitivity to recommend a prioritized security testing strategy.
Analyzes source code to identify and mitigate Server-Side Request Forgery (SSRF) vulnerabilities and unauthorized internal network access.
Audits application and infrastructure configurations to identify and remediate security vulnerabilities based on OWASP standards.
Identifies security vulnerabilities related to unauthorized data modification and injection attacks using the STRIDE threat model.
Scroll for more results...