Security Skills
Security skills help you audit code, test for vulnerabilities, implement secure patterns, and ensure compliance.114 skills covering security auditing, penetration testing, DevSecOps, and compliance
Security Auditing
Security Auditor
Expert DevSecOps, cybersecurity, and compliance frameworks
Threat Modeling Expert
STRIDE, PASTA, attack trees, and risk assessment
Find Bugs
Find bugs and vulnerabilities in local branch changes
Code Review Checklist
Comprehensive code review covering security and performance
Audit & Review Skills
| Skill | Description |
|---|---|
security-audit | Comprehensive security auditing workflow |
security-auditor | Expert security auditor specializing in DevSecOps |
find-bugs | Find bugs, security vulnerabilities, and code quality issues |
code-review-excellence | Provide constructive feedback and catch bugs |
code-review-checklist | Thorough code reviews covering security |
laravel-security-audit | Security auditor for Laravel applications |
vibe-code-auditor | Audit AI-produced code for production risks |
Penetration Testing
Web Application Testing
Web Application Testing
api-security-testing- REST and GraphQL API securityweb-security-testing- OWASP Top 10 vulnerabilitiesapi-fuzzing-bug-bounty- Fuzz APIs and find IDOR vulnerabilitiesburp-suite-testing- Intercept HTTP traffic and modify requestsxss-html-injection- Test for XSS vulnerabilitiessql-injection-testing- Test for SQL injectionidor-testing- Test for insecure direct object referencesbroken-authentication- Test authentication vulnerabilitiesfile-path-traversal- Test for directory traversalhtml-injection-testing- Test for HTML injection
Cloud & Infrastructure Testing
Cloud & Infrastructure Testing
aws-penetration-testing- Pentest AWS infrastructurecloud-penetration-testing- Test Azure, AWS, GCP securitynetwork-101- Web server setup, HTTP/HTTPS, SNMP, SMBsmtp-penetration-testing- SMTP enumeration and testingssh-penetration-testing- SSH service penetration testingwordpress-penetration-testing- Pentest WordPress sites
Active Directory & Enterprise
Active Directory & Enterprise
active-directory-attacks- Attack AD, Kerberoasting, DCSyncwindows-privilege-escalation- Windows privilege escalationprotocol-reverse-engineering- Network protocol analysiswireshark-analysis- Analyze network traffic with Wireshark
Testing Tools
metasploit-framework- Exploit vulnerabilities with msfconsolescanning-tools- Vulnerability scanning and network assessmentsqlmap-database-pentesting- Automate SQL injection testingffuf-claude-skill- Web fuzzing with ffuf
Secure Coding
Backend Security
Input validation, authentication, API security
Frontend Security
XSS prevention, output sanitization, client-side security
Mobile Security
Input validation, WebView security, mobile patterns
Solidity Security
Smart contract security and secure patterns
Secure Coding Skills
backend-security-coder- Secure backend coding practicesfrontend-security-coder- XSS prevention and sanitizationmobile-security-coder- Mobile-specific security patternssolidity-security- Smart contract security best practicesapi-security-best-practices- Secure API design patternsauth-implementation-patterns- JWT, OAuth2, session management, RBAC
Vulnerability Management
| Category | Skills |
|---|---|
| Scanning | vulnerability-scanner, sast-configuration, dependency-management-deps-audit |
| Analysis | threat-modeling-expert, stride-analysis-patterns, attack-tree-construction |
| Mitigation | threat-mitigation-mapping, security-requirement-extraction |
DevSecOps
Security Automation
Security Automation
security-scanning-security-hardening- Multi-layer security scanningsecurity-scanning-security-sast- Static Application Security Testingsecurity-scanning-security-dependencies- Dependency vulnerability analysissast-configuration- Configure SAST tools for automationcodebase-cleanup-deps-audit- Vulnerability and license compliance
Authentication & Authorization
auth-implementation-patterns- JWT, OAuth2, session managementclerk-auth- Clerk auth implementation with Next.jsnextjs-supabase-auth- Supabase Auth with Next.js App Routerconvex- Convex reactive backend with authfirebase- Firebase auth, database, storage
Compliance & Standards
GDPR
GDPR-compliant data handling and consent
PCI DSS
Payment card data security requirements
WCAG
Accessibility compliance and auditing
AWS Compliance
CIS, PCI-DSS, HIPAA, SOC 2 benchmarks
Compliance Skills
security-compliance-compliance-check- GDPR, HIPAA, SOC2, PCI-DSSgdpr-data-handling- Consent management and privacy by designpci-compliance- PCI DSS requirements for payment datawcag-audit-patterns- WCAG 2.2 accessibility auditsaccessibility-compliance-accessibility-audit- WCAG compliancesecurity/aws-compliance-checker- AWS compliance checkingsecurity/aws-iam-best-practices- IAM policy review and hardening
Secrets Management
secrets-management- Secure secrets for CI/CD pipelinesazure-keyvault-*- Azure Key Vault across all languagesvarlock-claude-skill- Secure environment variable managementsecurity/aws-secrets-rotation- Automate AWS secrets rotation
Security Operations
Incident Response
Incident Response
incident-responder- Rapid problem resolutionincident-response-incident-response- Incident response workflowincident-response-smart-fix- AI-assisted debugging and resolutionincident-runbook-templates- Structured response procedurespostmortem-writing- Blameless postmortems with action items
Malware & Forensics
Malware & Forensics
malware-analyst- Defensive malware researchfirmware-analyst- Embedded systems and IoT securitymemory-forensics- Memory acquisition and artifact extractionbinary-analysis-patterns- Disassembly and decompilationanti-reversing-techniques- Bypass anti-reversing protections
Threat Intelligence & Red Team
red-team-tactics- MITRE ATT&CK tacticsethical-hacking-methodology- Penetration testing lifecycletop-web-vulnerabilities- Common security flawspentest-checklist- Penetration test planning
Service Mesh & Network Security
service-mesh-expert- Istio, Linkerd, security policiesmtls-configuration- Mutual TLS for zero-trustk8s-security-policies- NetworkPolicy, PodSecurityPolicy, RBACnetwork-engineer- Cloud networking and security