sast-configuration
Safe 69Configure SAST tools for secure code scanning
by wshobson
You need consistent SAST tool setup across your projects. This skill provides guidance for configuring Semgrep, SonarQube, and CodeQL with custom rules and CI integration.
pci-compliance
Safe 71Implement PCI DSS Compliance
by wshobson
This skill provides guidance on implementing PCI DSS requirements for secure payment processing. It covers encryption, tokenization, access controls, and audit logging to help achieve and maintain payment card industry compliance.
mtls-configuration
Safe 71Configure mTLS for zero-trust networking
by wshobson
Secure service-to-service communication with mutual TLS authentication. This skill provides ready-to-use templates for Istio, Linkerd, SPIFFE, and cert-manager to implement zero-trust security in Kubernetes environments.
k8s-security-policies
Safe 74Implement Kubernetes Security Policies and RBAC Controls
by wshobson
Kubernetes clusters need proper security policies to protect against unauthorized access and network attacks. This skill provides ready-to-use templates for NetworkPolicy, RBAC, and Pod Security Standards.
bash-defensive-patterns
Safe 69Build safer Bash scripts
by wshobson
Write Bash scripts that fail safely and are easier to debug. This skill provides defensive patterns for errors, inputs, and cleanup.
auth-implementation-patterns
Safe 69Implement secure authentication patterns
by wshobson
You need clear guidance for secure authentication and authorization choices. This skill provides proven patterns and examples you can adapt quickly for JWT, OAuth2, and session management.
attack-tree-construction
Safe 69Build attack trees for security planning
by wshobson
Threat paths are hard to map and explain. This skill provides structured attack tree templates and analysis guidance for clearer risk communication and defense planning.
verification-before-completion
Safe 70Verify before claiming completion
by obra
AI agents often claim work is complete without actual verification. This skill enforces evidence-based completion claims by requiring verification command output before any success assertions. It prevents false completion reports and builds trust through proof.
find-bugs
Safe 69Find Bugs and Security Vulnerabilities
by getsentry
Identify code issues in your changes. This skill systematically reviews branch changes for bugs, security vulnerabilities, and code quality problems using a structured approach.
defense-in-depth
Safe 71Apply Defense-in-Depth Validation
by DYAI2025
Invalid data can bypass single validation checks through different code paths, refactoring, or mocks. Apply validation at every layer data passes through to make bugs structurally impossible.
dependency-security
Safe 71Scan dependencies for vulnerabilities and generate SBOM
by Doyajin174
Dependency vulnerabilities are a leading cause of security breaches in modern applications. This skill provides clear guidance for scanning npm packages, generating Software Bill of Materials documents, and implementing supply chain security practices.
when-setting-network-security-use-network-security-setup
Low Risk 68Configure sandbox network security
by DNYoussef
Claude Code sandbox needs secure network configuration to prevent unauthorized access while allowing trusted domains. This skill provides step-by-step guidance for configuring firewall rules, trusted domains, and access policies.
when-configuring-sandbox-security-use-sandbox-configurator
Low Risk 66Configure sandbox security settings
by DNYoussef
Claude Code sandbox environments need proper security boundaries to prevent unauthorized access. This skill provides step-by-step guidance to configure file system isolation, network restrictions, and resource limits for secure code execution.
when-auditing-security-use-security-analyzer
Safe 69Run comprehensive security audits with multi-agent coordination
by DNYoussef
Security vulnerabilities often go undetected until it is too late. This skill performs automated security auditing across 5 vectors to identify SQL injection, XSS, path traversal, and other vulnerabilities before attackers do.
theater-detection-audit
Safe 71Detect placeholder code and mocks in codebases
by DNYoussef
Codebases often contain placeholder code, mock data, and stub implementations that appear functional but are not production-ready. This skill systematically identifies all instances of theater and provides a workflow to replace them with production-quality code.
sandbox-configurator
Safe 70Configure sandbox security boundaries
by DNYoussef
Claude Code sandbox configuration is complex and security trade-offs are unclear. This skill provides a specialist agent that analyzes your development needs and generates appropriate sandbox configurations with four security levels from maximum isolation to development mode.
network-security-setup
Safe 69Configure Zero-Trust Network Isolation for Claude Code
by DNYoussef
Protect your AI coding environment from prompt injection attacks and data exfiltration. Configure trusted domain whitelists, proxy settings, and secure environment variable handling for safe development.
constitution-guardian
Safe 70Enforce Constitution Compliance in DevFlow Documents
by Dimon94
Prevent non-compliant content from being saved to project documentation. This guardrail enforces CC-DevFlow Constitution rules by detecting partial implementations and hardcoded secrets in real-time during file editing.
ubs
Low Risk 68Scan Code for Bugs Before Every Commit
by Dicklesworthstone
AI agents write code fast but can introduce bugs like null pointer errors, missing await statements, and security vulnerabilities. UBS provides pre-commit static analysis across 8 languages to catch these issues in seconds before they reach production.
slb
Safe 68Add safety gates for destructive commands
by Dicklesworthstone
AI agents can accidentally run destructive commands that cause irreversible damage. This skill integrates the Simultaneous Launch Button tool to implement a two-person rule, requiring peer approval before executing risky commands like rm, git push --force, or DROP TABLE.