github-oauth-nango-integration
Sûr 70Implement GitHub OAuth with Nango
par AgentWorkforce
Building apps that need both user login and repository access requires two different GitHub authentication mechanisms. This skill provides the two-connection OAuth pattern using Nango for secure login while maintaining granular repo permissions through GitHub App installations.
gdpr-compliance
Sûr 69Implement GDPR data compliance
par Acurioustractor
Developers need clear guidance on implementing data subject rights and consent management. This skill provides ready-to-use TypeScript interfaces, SQL schemas, and code review checklists for GDPR compliance in web applications.
cultural-review
Sûr 70Review code for cultural sensitivity
par Acurioustractor
Code affecting Indigenous communities requires careful cultural review. This skill provides OCAP framework guidance for ensuring cultural sensitivity and Indigenous data sovereignty compliance in your projects.
authentication-logic
Sûr 68Implement authentication with Better Auth
par AbdulSamad94
Building secure user authentication requires understanding both client and server-side patterns. This skill provides a practical guide to implementing authentication using Better Auth in Next.js applications with clear code examples.
auth-handler
Sûr 70Manage Next.js Authentication with NextAuth v5
par AayushBaniya2006
Authentication implementation can be complex and error-prone, leading to security vulnerabilities. This skill provides clear guidelines for implementing secure authentication, authorization, and session management in Next.js applications using NextAuth v5 with defense-in-depth protection patterns.
security-engineering
Sûr 72Apply Security Engineering Best Practices
par 89jobrien
Design secure systems and implement robust security controls. This skill provides comprehensive guidance on security architecture, authentication, authorization, and compliance frameworks.
security-audit
Sûr 73Audit Code Security
par 89jobrien
Security audits require systematic methodology and comprehensive checklists. This skill provides OWASP Top 10 guidance, vulnerability assessment frameworks, and audit report templates for thorough security reviews.
ai-ethics
Sûr 72Apply AI ethics principles to development
par 89jobrien
AI systems can perpetuate bias and cause harm without proper ethical safeguards. This skill provides comprehensive guidance for implementing fairness measures, detecting bias, ensuring regulatory compliance, and building trustworthy AI systems.
delon-auth-authentication-authorization
Sûr 71Add secure authentication to Angular apps
par 7Spade
Building secure authentication in Angular requires careful implementation of tokens, guards, and permission checks. This skill provides ready-to-use patterns for JWT management, role-based access control, and route protection using the @delon/auth library.
delon-acl
Sûr 70Implement role-based access control
par 7Spade
Angular applications need a reliable way to control user permissions and protect UI elements. This skill provides code patterns for implementing ACL with guards, directives, and permission checks.
azure-role-selector
Sûr 71Find Minimal Azure RBAC Roles for Your Permissions
par 7Spade
Selecting the right Azure role with appropriate permissions is complex and error-prone. This skill queries Azure documentation through MCP tools to identify the minimal built-in role that matches your requirements or generates custom role definitions following least privilege principles.
fresh-eyes-review
Sûr 69Review code before committing
par 2389-research
Critical bugs often escape despite passing tests. This skill enforces a mandatory final quality gate that catches security vulnerabilities, logic errors, and business rule bugs before code ships.
firebase-development-validate
Sûr 71Validate Firebase code security and architecture
par 2389-research
Firebase projects often have misconfigurations that lead to security vulnerabilities. This skill provides a systematic validation checklist covering Firestore rules, functions architecture, authentication patterns, and production readiness checks.
binary-re-triage
Sûr 71Identify binary architecture and dependencies
par 2389-research
Unknown binaries from embedded devices require quick identification before analysis. This skill runs rabin2 and file commands to extract architecture, libc type, and library dependencies in seconds.
binary-re-tool-setup
Risque moyen 63Set up reverse engineering tools
par 2389-research
Binary analysis requires properly installed tools. This skill provides installation guides for radare2, Ghidra, GDB, QEMU, and cross-compilation toolchains across Ubuntu, WSL2, macOS, and Arch Linux.
binary-re-synthesis
Sûr 71Synthesize binary analysis findings into structured reports
par 2389-research
Binary reverse engineering produces scattered facts and hypotheses that are difficult to organize and present. This skill provides systematic synthesis methodology to compile findings into confidence-calibrated reports with traceable evidence chains for stakeholders.
binary-re-dynamic-analysis
Risque faible 67Analyze Binaries with Dynamic Runtime Tracing
par 2389-research
Security researchers need to observe actual binary behavior at runtime, not just static code. This skill provides safe, sandboxed execution with QEMU emulation, GDB debugging, and Frida hooking to trace syscalls, inspect memory, and validate reverse engineering hypotheses.
binary-re
Risque faible 69Analyze Unknown Binaries with Guided Reverse Engineering
par 2389-research
Binary reverse engineering is complex and requires specialized tools and methodologies. This skill provides Claude Code with step-by-step guidance for analyzing executables across architectures using industry-standard tools like radare2, QEMU, and Ghidra with proper safety protocols.
security-patterns
Sûr 77Apply OWASP security patterns
par 0xDarkMatter
Write secure code by applying proven security patterns. This skill provides OWASP Top 10 guidelines, authentication patterns, input validation, and security headers implementation.
vibe-security
Sûr 74Scan code for security vulnerabilities
par 0x8506
Code vulnerabilities like SQL injection and XSS create serious security risks. This skill automatically detects vulnerabilities across multiple languages and provides secure code fixes with explanations.