Loading...
Loading...
Found 277 Skills
Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.
Manage project dependencies across languages including npm install, package versioning, dependency conflicts, security scanning, and lock files. Use when dealing with dependencies, version pinning, semantic versioning, or resolving conflicts.
Quick reference for all Supabase security audit skills with usage examples and command overview.
List and test exposed PostgreSQL RPC functions for security issues and potential RLS bypass.
Generate a comprehensive Markdown security audit report with executive summary, findings, and remediation guidance.
Extract the Supabase anon/public API key from client-side code. This key is expected in client apps but important for RLS testing.
Extract and decode Supabase-related JWTs from client-side code, cookies, and local storage patterns.
Compare two security audit reports to track remediation progress and identify new vulnerabilities.
Discover and test Supabase Edge Functions for security vulnerabilities and misconfigurations.
Use when reviewing code, pull requests, or diffs. Provides patterns, checklists, and templates for systematic code review with a focus on correctness, security, readability, performance, and maintainability.
Quality assurance specialist for security, performance, accessibility, and comprehensive testing
Deep architectural context building for security audits. Use when conducting security reviews, building codebase understanding, mapping trust boundaries, or preparing for vulnerability analysis. Inspired by Trail of Bits methodology.