Security

225 skills

Security, authentication, and encryption tools

web-design-guidelines by langgenius

web-design-guidelines

langgenius

Review UI code for Web Interface Guidelines compliance. Use when asked to "review my UI", "check accessibility", "audit design", "review UX", or "check my site against best practices".

127.9kUpdated Jan 21
web-design-guidelines by calcom

web-design-guidelines

calcom

Review UI code for Web Interface Guidelines compliance. Use when asked to "review my UI", "check accessibility", "audit design", "review UX", or "check my site against best practices".

39.9kUpdated Jan 16
springboot-security by affaan-m

springboot-security

affaan-m

Spring Security best practices for authn/authz, validation, CSRF, secrets, headers, rate limiting, and dependency security in Java Spring Boot services.

34.9kUpdated Jan 30
accessibility-compliance by wshobson

accessibility-compliance

wshobson

Implement WCAG 2.2 compliant interfaces with mobile accessibility, inclusive design patterns, and assistive technology support. Use when auditing accessibility, implementing ARIA patterns, building for screen readers, or ensuring inclusive user experiences.

27.1kUpdated Jan 19
security-requirement-extraction by wshobson

security-requirement-extraction

wshobson

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

27.1kUpdated Jan 19
pci-compliance by wshobson

pci-compliance

wshobson

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card security measures.

27.1kUpdated Jan 19
nodejs-backend-patterns by wshobson

nodejs-backend-patterns

wshobson

Build production-ready Node.js backend services with Express/Fastify, implementing middleware patterns, error handling, authentication, database integration, and API design best practices. Use when creating Node.js servers, REST APIs, GraphQL backends, or microservices architectures.

27.1kUpdated Jan 19
auth-implementation-patterns by wshobson

auth-implementation-patterns

wshobson

Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.

27.1kUpdated Jan 19
wcag-audit-patterns by wshobson

wcag-audit-patterns

wshobson

Conduct WCAG 2.2 accessibility audits with automated testing, manual verification, and remediation guidance. Use when auditing websites for accessibility, fixing WCAG violations, or implementing accessible design patterns.

27.1kUpdated Jan 15
WordPress Penetration Testing by davila7

WordPress Penetration Testing

davila7

This skill should be used when the user asks to "pentest WordPress sites", "scan WordPress for vulnerabilities", "enumerate WordPress users, themes, or plugins", "exploit WordPress vulnerabilities", or "use WPScan". It provides comprehensive WordPress security assessment methodologies.

18.8kUpdated Jan 25
vulnerability-scanner by davila7

vulnerability-scanner

davila7

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

18.8kUpdated Jan 25
Top 100 Web Vulnerabilities Reference by davila7

Top 100 Web Vulnerabilities Reference

davila7

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks", "review access control weaknesses", "analyze API security issues", "assess security misconfigurations", "understand client-side vulnerabilities", "examine mobile and IoT security flaws", or "reference the OWASP-aligned vulnerability taxonomy". Use this skill to provide comprehensive vulnerability definitions, root causes, impacts, and mitigation strategies across all major web security categories.

18.8kUpdated Jan 25
SSH Penetration Testing by davila7

SSH Penetration Testing

davila7

This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or "audit SSH security". It provides comprehensive SSH penetration testing methodologies and techniques.

18.8kUpdated Jan 25
SMTP Penetration Testing by davila7

SMTP Penetration Testing

davila7

This skill should be used when the user asks to "perform SMTP penetration testing", "enumerate email users", "test for open mail relays", "grab SMTP banners", "brute force email credentials", or "assess mail server security". It provides comprehensive techniques for testing SMTP server security.

18.8kUpdated Jan 25
Security Scanning Tools by davila7

Security Scanning Tools

davila7

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware", "check cloud security", or "evaluate system compliance". It provides comprehensive guidance on security scanning tools and methodologies.

18.8kUpdated Jan 25
Pentest Commands by davila7

Pentest Commands

davila7

This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits", "crack passwords with hydra or john", "scan web vulnerabilities with nikto", "enumerate networks", or needs essential penetration testing command references.

18.8kUpdated Jan 25
Pentest Checklist by davila7

Pentest Checklist

davila7

This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.

18.8kUpdated Jan 25
IDOR Vulnerability Testing by davila7

IDOR Vulnerability Testing

davila7

This skill should be used when the user asks to "test for insecure direct object references," "find IDOR vulnerabilities," "exploit broken access control," "enumerate user IDs or object references," or "bypass authorization to access other users' data." It provides comprehensive guidance for detecting, exploiting, and remediating IDOR vulnerabilities in web applications.

18.8kUpdated Jan 25
Broken Authentication Testing by davila7

Broken Authentication Testing

davila7

This skill should be used when the user asks to "test for broken authentication vulnerabilities", "assess session management security", "perform credential stuffing tests", "evaluate password policies", "test for session fixation", or "identify authentication bypass flaws". It provides comprehensive techniques for identifying authentication and session management weaknesses in web applications.

18.8kUpdated Jan 25
AWS Penetration Testing by davila7

AWS Penetration Testing

davila7

This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata SSRF", "Lambda exploitation", or needs guidance on Amazon Web Services security assessment.

18.8kUpdated Jan 25
api-security-best-practices by davila7

api-security-best-practices

davila7

Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities

18.8kUpdated Jan 25
twilio-communications by davila7

twilio-communications

davila7

Build communication features with Twilio: SMS messaging, voice calls, WhatsApp Business API, and user verification (2FA). Covers the full spectrum from simple notifications to complex IVR systems and multi-channel authentication. Critical focus on compliance, rate limits, and error handling. Use when: twilio, send SMS, text message, voice call, phone verification.

18.8kUpdated Jan 25
isms-audit-expert by davila7

isms-audit-expert

davila7

Senior ISMS Audit Expert for internal and external information security management system auditing. Provides ISO 27001 audit expertise, security audit program management, security control assessment, and compliance verification. Use for ISMS internal auditing, external audit preparation, security control testing, and ISO 27001 certification support.

18.8kUpdated Dec 20
information-security-manager-iso27001 by davila7

information-security-manager-iso27001

davila7

Senior Information Security Manager specializing in ISO 27001 and ISO 27002 implementation for HealthTech and MedTech companies. Provides ISMS implementation, cybersecurity risk assessment, security controls management, and compliance oversight. Use for ISMS design, security risk assessments, control implementation, and ISO 27001 certification activities.

18.8kUpdated Dec 20