Find the perfect skill
Ask Secure by Design Questions
Security
Generate a prioritized set of secure by design questions to help builders ensure components are created securely at the fundamental design level.
Node.js Security Audit
Security
Analyzes Node.js vulnerabilities (RCE, SSRF, SQL injection, path traversal) for Express/Koa/NestJS with risk severity classification.
Secure Code Review Checklist
Security
Perform systematic security code reviews with automated checks for common vulnerability patterns.
Code Injection Detector
Security
Automated skill for detecting and preventing code injection vulnerabilities. Covers input validation, secure coding practices, and vulnerability detection following OWASP standards.
Global Security
Security
Guidance for adhering to coding standards related to global security. Provides Claude Code with specific directives on handling security in development projects.
SSRF Vulnerability Detection and Exploitation
Security
Detects and exploits SSRF vulnerabilities to access internal resources, read local files, and attack internal services through URL parameters, remote file loading, Webhooks, PDF generation, and URL preview features.
Instantly Enterprise RBAC Configuration
Security
Configure SSO authentication, role-based access control, and organization management for Instantly. Integrate SAML/OIDC with automatic role mapping.
Global Validation
Security
Implement comprehensive input validation on both client and server sides with clear error feedback. Sanitize data to prevent injection attacks and apply business rules consistently across all entry points.
SSRF Detection and Exploitation
Security
Detects and exploits Server-Side Request Forgery (SSRF) vulnerabilities to access internal resources, read local files, and cloud metadata. Covers protocol testing, network reconnaissance, and attacks against internal services.
SSRF Detection and Exploitation
Security
Detects and exploits Server-Side Request Forgery (SSRF) vulnerabilities to access internal resources, read local files, or attack internal services through URL parameters, webhooks, or PDF generation features.
SSRF Detection and Exploitation
Security
Detect and exploit Server-Side Request Forgery vulnerabilities to access internal resources, read local files, or attack other services through URL parameters, remote file loading, and webhook features.
Security Headers Configurator
Security
Configure comprehensive security headers for web applications to prevent common attack vectors.