Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,743 skills, Security & Compliance has 1632 skills

Categories

Showing 12 of 1632 skills

Per page
Downloads
Sort
Security & Compliancenesnilnehc/ai-cortex

review-security

Review code for security: injection, sensitive data, authentication and authorization, dependencies and CVEs, configuration and secrets, and crypto. Cognitive-only atomic skill; output is a findings list.

🇺🇸|EnglishTranslated
5
Security & Compliance404kidwiz/claude-supercod...

dependency-manager

Expert at package management and supply chain security. Use when managing dependencies, updating packages, resolving version conflicts, ensuring supply chain security, or auditing vulnerabilities in project dependencies.

🇺🇸|EnglishTranslated
5
Security & Compliancemadsnorgaard/agent-resour...

drupal-security

Drupal security expertise. Auto-activates when writing forms, controllers, queries, or handling user input. Prevents XSS, SQL injection, and access bypass vulnerabilities.

🇺🇸|EnglishTranslated
5
Security & Complianceramzxy/ctf

ctf-misc

Miscellaneous CTF challenge techniques. Use for trivia, automation scripts, encoding puzzles, RF/SDR signal processing, or challenges that don't fit other categories.

🇺🇸|EnglishTranslated
5
Security & Complianceramzxy/ctf

ctf-forensics

Digital forensics and blockchain analysis for CTF challenges. Use when analyzing disk images, memory dumps, event logs, network captures, or cryptocurrency transactions.

🇺🇸|EnglishTranslated
5
Security & Complianceramzxy/ctf

write-exploit

Write, test, and iterate on CTF exploit scripts. Use when you need to develop a working exploit with a test-debug-fix loop against a live target.

🇺🇸|EnglishTranslated
5
Security & Complianceramzxy/ctf

ctf-malware

Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic.

🇺🇸|EnglishTranslated
5
Security & Complianceg36maid/ctf-arsenal

misc-tools

Miscellaneous CTF tools for programming challenges, esoteric languages, QR/barcode scanning, and audio/video analysis. Trigger: When solving misc challenges, esoteric languages, QR codes, or media files.

🇺🇸|EnglishTranslated
5
4 scripts/Attention
Security & Compliancexiaowanjiagit/linuxdo

pentest-engineer

Role of Web Security Testing and Penetration Engineer, focusing on JavaScript reverse engineering and browser security research. Trigger scenarios: (1) JS reverse analysis: identification of encryption algorithms (SM2/SM3/SM4/AES/RSA), obfuscated code restoration, Cookie anti-crawling bypass, WASM reverse engineering (2) Browser debugging: XHR breakpoints, event listening, infinite debugger bypass, Source Map restoration (3) Hook technology: writing XHR/Header/Cookie/JSON/WebSocket/Canvas Hooks (4) Security product analysis: Offensive and defensive analysis of JS security products such as Ruishu, Jiasule, Chuangyudun, etc. (5) Legal scenarios such as CTF competitions, authorized penetration testing, security research, etc.

🇨🇳|ChineseTranslated
5
7 scripts/Attention
Security & Complianceg36maid/ctf-arsenal

pwn-exploits

Binary exploitation patterns using pwntools for buffer overflows, ROP chains, and shellcode in CTF challenges. Trigger: When solving pwn challenges, buffer overflows, ROP chains, or writing exploits.

🇺🇸|EnglishTranslated
5
15 scripts/Attention
Security & Complianceg36maid/ctf-arsenal

forensics-tools

Digital forensics tools for file carving, steganography detection, PCAP analysis, and entropy scanning in CTF challenges. Trigger: When analyzing files, steganography, PCAP traffic, or hidden data.

🇺🇸|EnglishTranslated
5
4 scripts/Attention
Security & Complianceigorwarzocha/opencode-wor...

security-bun

Review Bun runtime security audit patterns. Use for auditing Bun-specific vulnerabilities including shell injection, SQL injection, server security, and process spawning. Use proactively when reviewing Bun apps (bun.lockb, bunfig.toml, or bun:* imports present). Examples: - user: "Review this Bun shell script" → audit `$` usage and argument injection - user: "Check my bun:sqlite queries" → verify `sql` tagged template usage - user: "Audit my Bun.serve() setup" → check path traversal and request limits - user: "Is my Bun.spawn() usage safe?" → audit command injection and input validation - user: "Review WebSocket security in Bun" → check authentication before upgrade

🇺🇸|EnglishTranslated
5
1 scripts/Attention
1...4546474849...136
Page