Loading...
Loading...
Found 348 Skills
Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets, storage, network, authentication, cryptography, and platform-specific vulnerabilities. Use this skill when users need to secure their mobile app or run security audits.
Analyze OpenClaw skill permissions and explain exactly what each permission allows. Identifies over-privileged skills and suggests minimal permission sets.
Security audit for LLM and GenAI applications using OWASP Top 10 for LLM Apps 2025. Assess prompt injection, data leakage, supply chain, and 7 more critical vulnerabilities.
GoPlus AgentGuard — AI agent security guard. Automatically blocks dangerous commands, prevents data leaks, and protects secrets. Use when reviewing third-party code, auditing skills, checking for vulnerabilities, evaluating action safety, or viewing security logs.
Prepares codebases for security review using Trail of Bits' checklist. Helps set review goals, runs static analysis tools, increases test coverage, removes dead code, ensures accessibility, and generates documentation (flowcharts, user stories, inline comments).
Quick security audit checklist covering authentication, function exposure, argument validation, row-level access control, and environment variable handling
Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.
Orchestrate a complete Supabase security audit with guided step-by-step execution and ownership confirmation.
Quick reference for all Supabase security audit skills with usage examples and command overview.
Generate a comprehensive Markdown security audit report with executive summary, findings, and remediation guidance.
Extract the Supabase anon/public API key from client-side code. This key is expected in client apps but important for RLS testing.
Discover and test Supabase Edge Functions for security vulnerabilities and misconfigurations.