air-cryptographer
Safe 72Design and audit AIR constraint systems
by ClementWalter
Zero-knowledge proof systems require mathematically sound AIR constraints to guarantee computational integrity. This skill provides expert guidance on trace design, boundary constraints, permutation arguments, and security review methodologies for ZK protocols.
1password-credential-lookup
Low Risk 71Retrieve 1Password credentials by URL
by ClementWalter
AI agents need secure access to credentials for login automation. This skill provides URL-based lookup through 1Password CLI to retrieve usernames and passwords without exposing raw secrets in prompts.
verification-protocol
Safe 68Verify AI Task Completion with Evidence
by CleanExpo
AI agents often claim success without proof. This protocol forces independent verification with concrete evidence before marking tasks complete. It eliminates false completions and ensures quality through objective validation.
web-auth
Safe 69Implement secure web authentication
by CJHarmath
Building secure login flows and session management in React requires understanding multiple authentication patterns. This skill provides production-ready code examples for JWT, OAuth, cookies, and protected routes.
reconnaissance-knowledge
Medium Risk 61Master Network Reconnaissance with Claude Code
by CharlesKozel
Security professionals need structured methodologies for authorized penetration testing and network reconnaissance. This skill provides comprehensive knowledge of reconnaissance tools, layered scanning strategies, and best practices for systematic information gathering in authorized security assessments.
privilege-escalation-knowledge
Safe 69Escalate Linux privileges quickly
by CharlesKozel
Privilege escalation is complex and time-consuming. This knowledge base provides systematic methods to identify and exploit Linux privesc vectors including SUID binaries, sudo permissions, and kernel exploits.
pentest-coordinator
High Risk 57Automate Penetration Testing with ReAct Methodology
by CharlesKozel
This skill provides structured autonomous penetration testing using ReAct loops. It maintains state, applies specialized security knowledge, and coordinates reconnaissance, exploitation, and privilege escalation until both flags are captured.
exploitation-knowledge
Safe 69Apply exploitation techniques for penetration testing
by CharlesKozel
This skill provides structured guidance for vulnerability exploitation and initial access during authorized penetration tests. It covers exploit discovery, adaptation, shell establishment, and user flag capture using industry-standard tools and methodologies.
coordinator
Medium Risk 64Automate Penetration Testing with Strategic Coordination
by CharlesKozel
Manual penetration testing is time-consuming and requires deep expertise across multiple domains. This skill automates the entire process using a strategic coordinator that delegates tasks to specialized agents, ensuring comprehensive testing while you focus on high-level decisions.
auth
Safe 71Add authentication and payment features
by Chachamaru127
Users need secure ways to handle login and payments in their applications. This skill provides step-by-step guidance for implementing Clerk, Supabase Auth, and Stripe integrations with built-in security checklists.
security
Safe 70Validate security and scan for vulnerabilities
by ByronWilliamsCPA
Security vulnerabilities in code and dependencies can expose your project to attacks. This skill provides automated validation of GPG and SSH keys, runs vulnerability scanners, and guides compliance checking for secure development practices.
wsdiscovery
Low Risk 69Discover ONVIF cameras and IoT devices
by BrownFineSecurity
Finding network devices like ONVIF cameras requires understanding the WS-Discovery protocol. This skill provides guidance for discovering and enumerating WS-Discovery enabled equipment on your network using the wsdiscovery tool.
telnetshell
Medium Risk 64Interact with IoT device shells via telnet
by BrownFineSecurity
This skill enables secure telnet interaction with IoT device shells for penetration testing. It provides automated device enumeration, security assessment commands, and firmware extraction capabilities for authorized security testing.
picocom
Medium Risk 62Connect to IoT UART Serial Consoles
by BrownFineSecurity
IoT devices often expose debug interfaces via serial connections. This skill provides tools to connect to UART consoles, enumerate device information, interact with bootloaders, and perform security testing on embedded systems.
onvifscan
Low Risk 69Scan ONVIF Devices for Security Vulnerabilities
by BrownFineSecurity
Assessing the security of IP cameras and ONVIF-enabled devices is critical for protecting surveillance infrastructure. This skill provides structured access to authentication testing and credential brute-forcing tools for authorized security assessments.
nmap
Medium Risk 63Perform network reconnaissance with nmap
by BrownFineSecurity
Security professionals need to enumerate network services and identify vulnerabilities. This skill automates professional nmap port scanning with multiple scan types, service detection, and NSE scripts for comprehensive network reconnaissance.
jadx
Safe 69Decompile Android APKs for security analysis
by BrownFineSecurity
Android apps hide their code in DEX bytecode. This skill provides complete guidance for using jadx to convert APK files into readable Java source code. Analyze app logic, find vulnerabilities, and extract hardcoded credentials with expert techniques.
iotnet
Low Risk 69Analyze IoT network traffic for security issues
by BrownFineSecurity
Analyzing IoT network traffic manually is complex and time-consuming. This skill guides AI assistants to use the iotnet tool for automated detection of IoT protocols and security vulnerabilities in packet captures.
ffind
Safe 70Analyze firmware and extract filesystems
by BrownFineSecurity
Security researchers need to identify file types and extract embedded filesystems from firmware images. This skill provides commands and guidance for using ffind to analyze binary files, detect file types, and extract ext2/3/4 or F2FS filesystems.
chipsec
Safe 69Analyze UEFI firmware for malware and vulnerabilities
by BrownFineSecurity
UEFI firmware attacks are stealthy and persistent. This skill uses Intel's chipsec framework to scan firmware dumps for known rootkits, detect vulnerabilities, and generate inventories of EFI modules. Analyze firmware safely offline without requiring hardware access.