evidence-verification
Safe 67Verify work with evidence before completion
by ArieGoldkin
AI agents often claim tasks are complete without proof. This skill ensures every claim is backed by executable evidence like test results, build status, and coverage metrics. It prevents hallucinations and ensures production quality by requiring verifiable proof before marking tasks done.
quality-reviewer
Safe 69Review Code with Latest Ecosystem Research
by ArcadeAI
Code reviews may miss outdated dependencies or deprecated patterns. This skill performs deep analysis with real-time web research to verify versions, check security vulnerabilities, and validate against current documentation.
sharepoint-audit
Low Risk 67Audit SharePoint permissions
by Aqualia
Users need to audit SharePoint Online permissions for security compliance. This skill guides you through setting up certificate authentication, running local audit scripts, and generating permission reports for single sites or batches from CSV files.
security-audit
Safe 69Audit code for security vulnerabilities and risks
by AppleLamps
Manual security reviews are time-consuming and may miss common vulnerabilities. This skill systematically checks code for command injection, permission issues, and exposed secrets using read-only analysis.
writing-hookify-rules
Safe 70Create Hookify Rules for Claude Safety
by anthropics
Developers need to prevent dangerous patterns like eval(), rm -rf, and secret exposure in Claude workflows. This skill teaches you to write Hookify rules that detect and block risky commands and code edits before they execute.
senior-security
Low Risk 76Senior Security Engineering Toolkit
by alirezarezvani
This skill provides comprehensive security engineering capabilities for application security, threat modeling, and compliance auditing. It helps security professionals design secure architectures, implement proper cryptography, and automate security assessments across multiple technology stacks.
senior-secops
Safe 77Automate security scanning and compliance checks
by alirezarezvani
Security teams spend hours manually reviewing code and configurations for vulnerabilities. This SecOps skill provides automated security scanning, vulnerability assessment, and compliance checking tools to streamline security operations and ensure consistent coverage across codebases.
quality-manager-qmr
Safe 80Lead Quality Management for HealthTech Organizations
by alirezarezvani
HealthTech and MedTech companies face complex quality system requirements across multiple jurisdictions. This skill provides senior quality manager expertise for ISO 13485 compliance, regulatory oversight, and strategic quality leadership.
isms-audit-expert
Safe 80Conduct ISO 27001 ISMS Audits
by alirezarezvani
Organizations need systematic security assessments but lack specialized audit expertise. This skill provides comprehensive ISMS auditing capabilities for ISO 27001 compliance, security control testing, and certification preparation.
github-oauth-nango-integration
Safe 69Implement GitHub OAuth with Nango
by AgentWorkforce
Building apps that need both user login and repository access requires two different GitHub authentication mechanisms. This skill provides the two-connection OAuth pattern using Nango for secure login while maintaining granular repo permissions through GitHub App installations.
gdpr-compliance
Safe 68Implement GDPR data compliance
by Acurioustractor
Developers need clear guidance on implementing data subject rights and consent management. This skill provides ready-to-use TypeScript interfaces, SQL schemas, and code review checklists for GDPR compliance in web applications.
cultural-review
Safe 69Review code for cultural sensitivity
by Acurioustractor
Code affecting Indigenous communities requires careful cultural review. This skill provides OCAP framework guidance for ensuring cultural sensitivity and Indigenous data sovereignty compliance in your projects.
authentication-logic
Safe 68Implement authentication with Better Auth
by AbdulSamad94
Building secure user authentication requires understanding both client and server-side patterns. This skill provides a practical guide to implementing authentication using Better Auth in Next.js applications with clear code examples.
auth-handler
Safe 70Manage Next.js Authentication with NextAuth v5
by AayushBaniya2006
Authentication implementation can be complex and error-prone, leading to security vulnerabilities. This skill provides clear guidelines for implementing secure authentication, authorization, and session management in Next.js applications using NextAuth v5 with defense-in-depth protection patterns.
security-engineering
Safe 70Apply Security Engineering Best Practices
by 89jobrien
Design secure systems and implement robust security controls. This skill provides comprehensive guidance on security architecture, authentication, authorization, and compliance frameworks.
security-audit
Safe 71Audit Code Security
by 89jobrien
Security audits require systematic methodology and comprehensive checklists. This skill provides OWASP Top 10 guidance, vulnerability assessment frameworks, and audit report templates for thorough security reviews.
ai-ethics
Safe 71Apply AI ethics principles to development
by 89jobrien
AI systems can perpetuate bias and cause harm without proper ethical safeguards. This skill provides comprehensive guidance for implementing fairness measures, detecting bias, ensuring regulatory compliance, and building trustworthy AI systems.
delon-auth-authentication-authorization
Safe 69Add secure authentication to Angular apps
by 7Spade
Building secure authentication in Angular requires careful implementation of tokens, guards, and permission checks. This skill provides ready-to-use patterns for JWT management, role-based access control, and route protection using the @delon/auth library.
delon-acl
Safe 68Implement role-based access control
by 7Spade
Angular applications need a reliable way to control user permissions and protect UI elements. This skill provides code patterns for implementing ACL with guards, directives, and permission checks.
azure-role-selector
Safe 69Find Minimal Azure RBAC Roles for Your Permissions
by 7Spade
Selecting the right Azure role with appropriate permissions is complex and error-prone. This skill queries Azure documentation through MCP tools to identify the minimal built-in role that matches your requirements or generates custom role definitions following least privilege principles.