Security
35 skills
Top Security Skills
All Security Skills
Applying Brand Guidelines
This skill applies consistent corporate branding and styling to all generated documents including colors, fonts, layouts, and messaging.
Wcag Audit Patterns
Conduct WCAG 2.2 accessibility audits with automated testing, manual verification, and remediation guidance.
Attack Tree Construction
Build comprehensive attack trees to visualize threat paths.
Security Requirement Extraction
Derive security requirements from threat models and business context.
Sast Configuration
Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application code.
Seo Review
Perform a focused SEO audit on JavaScript concept pages.
Screen Reader Testing
Test web applications with screen readers including VoiceOver, NVDA, and JAWS.
Defi Protocol Templates
Implement DeFi protocols with production-ready templates for staking, AMMs, governance, and lending systems.
Web3 Testing
Test smart contracts comprehensively using Hardhat and Foundry.
Web3 Security
Guide for Web3 and blockchain security research
1k Adding Chains
Guide for adding new blockchain chains to OneKey.
Analyzing Liquidity Pools
Analyze liquidity pool metrics including TVL, volume, fees, and impermanent loss.
Optimizing Defi Yields
Execute find and compare DeFi yield opportunities across protocols with APY calculations.
Analyzing Mempool
Monitor blockchain mempools for pending transactions, front-running, and MEV opportunities.
Brand Guidelines
Applies Anthropic's official brand colors and typography to any artifact that benefits from Anthropic's look-and-feel.
Secret Scanner
Auto-activating skill for Security Fundamentals.
SMTP Penetration Testing
Comprehensive techniques for testing SMTP server security.
Active Directory Attacks
Comprehensive techniques for attacking Microsoft Active Directory environments.
Threat Mitigation Mapping
Map identified threats to appropriate security controls and mitigations.
Forensics Data Collector
Process forensics data collector operations.
Mobile Security
Guide for mobile game security on Android and iOS platforms.
Prowler Compliance
Creates and manages Prowler compliance frameworks.
Just Fucking Cancel
Analyze bank transaction CSVs to find recurring charges, categorize subscriptions, and cancel what you don't need.
Stride Analysis Patterns
Apply STRIDE methodology to systematically identify threats.
Generating Compliance Reports
Generate comprehensive compliance reports for security standards.
Senior Secops
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices.
Senior Security
Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing.
Performing Security Audits
Conduct comprehensive security audits on code and infrastructure.
Auditing Wallet Security
Execute review crypto wallet security including private key management and transaction signing.
Simulating Flash Loans
Execute simulate flash loan arbitrage strategies and profitability across DeFi protocols.
Analyzing On Chain Data
Process perform on-chain analysis including whale tracking, token flows, and network activity.
Exploring Blockchain Data
Process query and analyze blockchain data including blocks, transactions, and smart contracts.
Sql Injection Testing
Comprehensive techniques for identifying SQL injection vulnerabilities.
Ccxt
CCXT cryptocurrency trading library.
Cryptofeed
Real-time cryptocurrency market data feeds from 40+ exchanges.