Loading...
Loading...
Found 279 Skills
Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.
Manage project dependencies across languages including npm install, package versioning, dependency conflicts, security scanning, and lock files. Use when dealing with dependencies, version pinning, semantic versioning, or resolving conflicts.
Quick reference for all Supabase security audit skills with usage examples and command overview.
List and test exposed PostgreSQL RPC functions for security issues and potential RLS bypass.
Generate a comprehensive Markdown security audit report with executive summary, findings, and remediation guidance.
Extract the Supabase anon/public API key from client-side code. This key is expected in client apps but important for RLS testing.
Extract and decode Supabase-related JWTs from client-side code, cookies, and local storage patterns.
Compare two security audit reports to track remediation progress and identify new vulnerabilities.
Discover and test Supabase Edge Functions for security vulnerabilities and misconfigurations.
Use when reviewing code, pull requests, or diffs. Provides patterns, checklists, and templates for systematic code review with a focus on correctness, security, readability, performance, and maintainability.
Quality assurance specialist for security, performance, accessibility, and comprehensive testing
Security audit guidelines for web applications and REST APIs based on OWASP Top 10 and web security best practices. Use when checking code for vulnerabilities, reviewing auth/authz, auditing APIs, or before production deployment.