Category
Security
Security scanning, vulnerability assessment, and audit tools. These skills help identify security issues in codebases, dependencies, and configurations.
447 skills in this category
Red Team Tools and Methodology
sickn33/antigravity-awesome-skills
85This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate subdomains", or needs security researcher techniques and tool configurations from top bug bounty hunters.
SKILLPASSING0 Findingsabout 1 month agoseo-audit
coreyhaines31/marketingskills
85When the user wants to audit, review, or diagnose SEO issues on their site. Also use when the user mentions "SEO audit," "technical SEO," "why am I not ranking," "SEO issues," "on-page SEO," "meta tags review," or "SEO health check." For building pages at scale to target keywords, see programmatic-seo. For adding structured data, see schema-markup.
SKILLPASSING1 Findingabout 1 month agoPentest Checklist
sickn33/antigravity-awesome-skills
85This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.
SKILLPASSING0 Findingsabout 1 month agofirmware-analyst
sickn33/antigravity-awesome-skills
85Expert firmware analyst specializing in embedded systems, IoT security, and hardware reverse engineering. Masters firmware extraction, analysis, and vulnerability research for routers, IoT devices, automotive systems, and industrial controllers. Use PROACTIVELY for firmware security audits, IoT penetration testing, or embedded systems research.
SKILLPASSING1 Findingabout 1 month agoTop 100 Web Vulnerabilities Reference
sickn33/antigravity-awesome-skills
85This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks", "review access control weaknesses", "analyze API security issues", "assess security misconfigurations", "understand client-side vulnerabilities", "examine mobile and IoT security flaws", or "reference the OWASP-aligned vulnerability taxonomy". Use this skill to provide comprehensive vulnerability definitions, root causes, impacts, and mitigation strategies across all major web security categories.
SKILLPASSING0 Findingsabout 1 month agosecurity-bluebook-builder
sickn33/antigravity-awesome-skills
85Build security Blue Books for sensitive apps
SKILLPASSING0 Findingsabout 1 month agoazure-security-keyvault-keys-java
sickn33/antigravity-awesome-skills
85Azure Key Vault Keys Java SDK for cryptographic key management. Use when creating, managing, or using RSA/EC keys, performing encrypt/decrypt/sign/verify operations, or working with HSM-backed keys.
SKILLPASSING0 Findingsabout 1 month agopci-compliance
sickn33/antigravity-awesome-skills
85Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card security measures.
SKILLPASSING0 Findingsabout 1 month agolawvable/awesome-legal-skills:skills/security-review-openai
lawvable/awesome-legal-skills
85No description provided.
SKILLPASSING0 Findingsabout 1 month agofirebase
sickn33/antigravity-awesome-skills
85Firebase gives you a complete backend in minutes - auth, database, storage, functions, hosting. But the ease of setup hides real complexity. Security rules are your last line of defense, and they're often wrong. Firestore queries are limited, and you learn this after you've designed your data model. This skill covers Firebase Authentication, Firestore, Realtime Database, Cloud Functions, Cloud Storage, and Firebase Hosting. Key insight: Firebase is optimized for read-heavy, denormalized data. I
SKILLPASSING0 Findingsabout 1 month agoschema-markup
sickn33/antigravity-awesome-skills
85Design, validate, and optimize schema.org structured data for eligibility, correctness, and measurable SEO impact. Use when the user wants to add, fix, audit, or scale schema markup (JSON-LD) for rich results. This skill evaluates whether schema should be implemented, what types are valid, and how to deploy safely according to Google guidelines.
SKILLPASSING0 Findingsabout 1 month agoSecurity Scanning Tools
sickn33/antigravity-awesome-skills
85This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware", "check cloud security", or "evaluate system compliance". It provides comprehensive guidance on security scanning tools and methodologies.
SKILLPASSING0 Findingsabout 1 month ago