Loading...
Loading...
Found 2,630 Skills
Expert in detecting private information, secrets, API keys, credentials, and sensitive data in codebases before open sourcing
文件上传漏洞测试的专业技能和方法论
Guidance for implementing differential cryptanalysis attacks on FEAL (Fast Data Encipherment Algorithm) and similar block ciphers. This skill should be used when tasks involve recovering round keys, implementing differential attacks, exploiting cipher weaknesses, or performing cryptanalysis on Feistel network ciphers. Applicable to CTF challenges and educational cryptanalysis exercises.
Identifies and fixes XSS, SQL injection, and command injection vulnerabilities with validation schemas, sanitization libraries, and safe coding patterns. Use for "input validation", "XSS prevention", "SQL injection", or "sanitization".
CI/CD best practices for building automated pipelines, deployment strategies, testing, and DevOps workflows across platforms
Coordinates dependency upgrades across all detected package managers
AI trustworthiness testing using OWASP AI Testing Guide v1. Execute 44 test cases across 4 layers (Application, Model, Infrastructure, Data) with practical payloads and remediation.
Solve CTF (Capture The Flag) challenges by analyzing challenge descriptions, source code, and interacting with challenge environments to capture flags.
Comprehensive code review checklist for pull requests
Tools and frameworks for AI red teaming including PyRIT, garak, Counterfit, and custom attack automation
Understand sniper bots in Solana launches and implement defensive measures without harming fair access. Use before token or LP go-live.
Expert solutions architecture covering technical requirements, solution design, integration planning, and enterprise architecture alignment.