Search Skills

Search for skills or navigate to categories

SkillforthatSkillforthat

Security

35 skills

All Security Skills

A

Applying Brand Guidelines

This skill applies consistent corporate branding and styling to all generated documents including colors, fonts, layouts, and messaging.

W

Wcag Audit Patterns

Conduct WCAG 2.2 accessibility audits with automated testing, manual verification, and remediation guidance.

A

Attack Tree Construction

Build comprehensive attack trees to visualize threat paths.

S

Security Requirement Extraction

Derive security requirements from threat models and business context.

S

Sast Configuration

Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application code.

S

Seo Review

Perform a focused SEO audit on JavaScript concept pages.

S

Screen Reader Testing

Test web applications with screen readers including VoiceOver, NVDA, and JAWS.

D

Defi Protocol Templates

Implement DeFi protocols with production-ready templates for staking, AMMs, governance, and lending systems.

W

Web3 Testing

Test smart contracts comprehensively using Hardhat and Foundry.

W

Web3 Security

Guide for Web3 and blockchain security research

1

1k Adding Chains

Guide for adding new blockchain chains to OneKey.

A

Analyzing Liquidity Pools

Analyze liquidity pool metrics including TVL, volume, fees, and impermanent loss.

O

Optimizing Defi Yields

Execute find and compare DeFi yield opportunities across protocols with APY calculations.

A

Analyzing Mempool

Monitor blockchain mempools for pending transactions, front-running, and MEV opportunities.

B

Brand Guidelines

Applies Anthropic's official brand colors and typography to any artifact that benefits from Anthropic's look-and-feel.

S

Secret Scanner

Auto-activating skill for Security Fundamentals.

S

SMTP Penetration Testing

Comprehensive techniques for testing SMTP server security.

A

Active Directory Attacks

Comprehensive techniques for attacking Microsoft Active Directory environments.

T

Threat Mitigation Mapping

Map identified threats to appropriate security controls and mitigations.

F

Forensics Data Collector

Process forensics data collector operations.

M

Mobile Security

Guide for mobile game security on Android and iOS platforms.

P

Prowler Compliance

Creates and manages Prowler compliance frameworks.

J

Just Fucking Cancel

Analyze bank transaction CSVs to find recurring charges, categorize subscriptions, and cancel what you don't need.

S

Stride Analysis Patterns

Apply STRIDE methodology to systematically identify threats.

G

Generating Compliance Reports

Generate comprehensive compliance reports for security standards.

S

Senior Secops

Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices.

S

Senior Security

Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing.

P

Performing Security Audits

Conduct comprehensive security audits on code and infrastructure.

A

Auditing Wallet Security

Execute review crypto wallet security including private key management and transaction signing.

S

Simulating Flash Loans

Execute simulate flash loan arbitrage strategies and profitability across DeFi protocols.

A

Analyzing On Chain Data

Process perform on-chain analysis including whale tracking, token flows, and network activity.

E

Exploring Blockchain Data

Process query and analyze blockchain data including blocks, transactions, and smart contracts.

S

Sql Injection Testing

Comprehensive techniques for identifying SQL injection vulnerabilities.

C

Ccxt

CCXT cryptocurrency trading library.

C

Cryptofeed

Real-time cryptocurrency market data feeds from 40+ exchanges.