209 skills
πŸ”’

when-setting-network-security-use-network-security-setup

Low Risk 66

Configure sandbox network security

by DNYoussef

Claude Code sandbox needs secure network configuration to prevent unauthorized access while allowing trusted domains. This skill provides step-by-step guidance for configuring firewall rules, trusted domains, and access policies.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

when-configuring-sandbox-security-use-sandbox-configurator

Low Risk 65

Configure sandbox security settings

by DNYoussef

Claude Code sandbox environments need proper security boundaries to prevent unauthorized access. This skill provides step-by-step guidance to configure file system isolation, network restrictions, and resource limits for secure code execution.

Claude Codex Code(CC)
Install
πŸ”’

when-auditing-security-use-security-analyzer

Safe 67

Run comprehensive security audits with multi-agent coordination

by DNYoussef

Security vulnerabilities often go undetected until it is too late. This skill performs automated security auditing across 5 vectors to identify SQL injection, XSS, path traversal, and other vulnerabilities before attackers do.

Claude Codex Code(CC)
Install
πŸ”

theater-detection-audit

Safe 69

Detect placeholder code and mocks in codebases

by DNYoussef

Codebases often contain placeholder code, mock data, and stub implementations that appear functional but are not production-ready. This skill systematically identifies all instances of theater and provides a workflow to replace them with production-quality code.

Claude Codex Code(CC)
Install
πŸ”’

sandbox-configurator

Safe 69

Configure sandbox security boundaries

by DNYoussef

Claude Code sandbox configuration is complex and security trade-offs are unclear. This skill provides a specialist agent that analyzes your development needs and generates appropriate sandbox configurations with four security levels from maximum isolation to development mode.

Claude Codex Code(CC)
Install
πŸ”’

network-security-setup

Safe 69

Configure Zero-Trust Network Isolation for Claude Code

by DNYoussef

Protect your AI coding environment from prompt injection attacks and data exfiltration. Configure trusted domain whitelists, proxy settings, and secure environment variable handling for safe development.

Claude Codex Code(CC)
Install
πŸ“¦

constitution-guardian

Safe 68

Enforce Constitution Compliance in DevFlow Documents

by Dimon94

Prevent non-compliant content from being saved to project documentation. This guardrail enforces CC-DevFlow Constitution rules by detecting partial implementations and hardcoded secrets in real-time during file editing.

Claude Codex Code(CC)
Install
πŸ“¦

ubs

Low Risk 66

Scan Code for Bugs Before Every Commit

by Dicklesworthstone

AI agents write code fast but can introduce bugs like null pointer errors, missing await statements, and security vulnerabilities. UBS provides pre-commit static analysis across 8 languages to catch these issues in seconds before they reach production.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

slb

Safe 68

Add safety gates for destructive commands

by Dicklesworthstone

AI agents can accidentally run destructive commands that cause irreversible damage. This skill integrates the Simultaneous Launch Button tool to implement a two-person rule, requiring peer approval before executing risky commands like rm, git push --force, or DROP TABLE.

Claude Codex Code(CC)
Install
🦞

flywheel-discord

Safe 68

Operate as Clawdstein Discord assistant

by Dicklesworthstone

When assisting users on Discord, strict data isolation protects personal information from exposure. This skill ensures the assistant operates only within public boundaries while providing helpful support for Agent Flywheel tools.

Claude Codex Code(CC)
Install
πŸ“¦

global-validation

Safe 69

Implement Secure Input Validation Standards

by DevanB

Poor input validation leads to security vulnerabilities like SQL injection and XSS attacks. This skill guides Claude Code to implement server-side validation with allowlists, type checking, and proper sanitization.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

binary-analysis

Safe 69

Analyze suspicious binary files for malware

by DeepBitsTechnology

Security analysts need to quickly determine if unknown binary files are malicious without risking system infection. This skill provides structured analysis workflows using Ghidra decompilation and sandbox environments to safely examine suspicious executables and generate threat assessment reports.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

senior-security

Low Risk 72

Analyze Security Vulnerabilities and Architecture

by davila7

Security teams need systematic approaches to identify vulnerabilities, design secure architectures, and validate defenses. This skill provides automated tooling for threat modeling, penetration testing workflows, and security architecture reviews with best practice guidance.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

senior-secops

Low Risk 75

Automate security scanning and vulnerability assessment

by davila7

Security operations require consistent assessment and compliance validation across projects. This skill provides automated tools for security scanning, vulnerability assessment, and compliance checking with standardized reporting.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

isms-audit-expert

Safe 79

Audit ISMS security controls

by davila7

Organizations need systematic security assessments to maintain ISO 27001 compliance and identify gaps. This skill provides expert guidance for ISMS audits, security control testing, and compliance verification across organizational, technical, physical, and operational domains.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

information-security-manager-iso27001

Safe 79

Implement ISO 27001 Security Controls

by davila7

Organizations need expert guidance to implement ISO 27001 Information Security Management Systems and achieve compliance. This skill provides comprehensive frameworks for risk assessment, security controls, and regulatory compliance in healthcare and enterprise environments.

Claude Codex Code(CC)
Install
πŸ›

find-bugs

Safe 69

Find security bugs and vulnerabilities in code changes

by davila7

Finding bugs and security issues in code changes is time-consuming and requires systematic analysis. This skill provides a structured five-phase review process to identify injection attacks, XSS, authentication flaws, and other security vulnerabilities in git branch diffs.

Claude Codex Code(CC)
Install
πŸ“¦

surveillance-monitoring

Low Risk 66

Monitor Ubiquiti Protect Cameras

by DataKnifeAI

Managing a Ubiquiti Protect surveillance system requires checking multiple cameras, events, and system health metrics across different interfaces. This skill provides unified access to camera status, event logs, and system diagnostics for efficient surveillance management.

Claude Codex Code(CC)
Install
πŸ”’

security-gate

Safe 68

Run Security Reviews Before Deployment

by DanielPodolsky

Security vulnerabilities often slip through code reviews unnoticed. This gate provides systematic security checks to catch common issues like SQL injection, XSS, and authorization flaws before they reach production.

Claude Codex Code(CC)
Install
πŸ›‘οΈ

security-fundamentals

Safe 69

Review code security and OWASP compliance

by DanielPodolsky

Security vulnerabilities in code lead to data breaches and system compromise. This skill provides systematic checklists and OWASP Top 10 guidance for thorough security reviews during development.

Claude Codex Code(CC)
Install