Find the perfect skill
Security Audit Scanner
Security
Analyzes code to detect OWASP Top 10 vulnerabilities.
OWASP Security Checklist
Security
Generates application security checklists based on the OWASP Top 10.
Threat Model Generator
Security
Generates threat model documents with STRIDE analysis.
API Security Hardening
Security
Harden API endpoints with rate limiting, input validation, CORS, and proper error handling to prevent abuse.
Global Validation
Security
Implement comprehensive input validation on server-side with complementary client-side validation using allowlists and sanitization to prevent injection attacks. Apply this skill to validate all external data entering your application.
Encrypt/Decrypt BSV Backup Files
Security
Encrypt and decrypt BSV backup files in .bep format using bitcoin-backup CLI. Secure your private keys and sensitive data with AES-256-GCM encryption.
SSL/TLS Configuration Validator
Security
Validate and optimize SSL/TLS configurations for web servers, ensuring strong ciphers and proper certificate chains.
Global Validation
Security
Implement comprehensive input validation on both client and server sides with clear error feedback. Sanitize data to prevent injection attacks and apply validation consistently across all entry points.
Ideogram Data Handling
Security
Implement PII handling, data retention, and GDPR/CCPA compliance for Ideogram integrations. Includes detection, redaction, and automatic cleanup of sensitive data.
SSRF Detection and Exploitation
Security
Detects and exploits Server-Side Request Forgery (SSRF) vulnerabilities to access internal resources, read local files, or attack other services through URL parameters, webhooks, or PDF generation features.
Ask Secure by Design Questions
Security
Generate a prioritized set of secure by design questions to help builders ensure components/systems are created securely at the fundamental design level.
Database Audit Logging Implementation
Security
Implement database change tracking for compliance and security monitoring. Uses triggers, application-level logging, CDC, or native database logs.