🛡️
Gadget Best Practices
This skill provides best-practice guidance for Gadget full-stack apps, covering modeling, actions, routes, access control, and platform integrations.
backendfullstackapisecurity
🛡️
Github Actions
Create, evaluate, and optimize GitHub Actions workflows and custom actions. Use when building CI/CD pipelines, creating workflow files, developing custom actions, troubleshooting workflow failures, performing security analysis, optimizing performance, or reviewing GitHub Actions best practices. Cove
el-feosecurity
🛡️
Github Api
Orchestrates comprehensive GitHub API access across all services. Intelligently routes API operations to specialized resource files covering authentication, repositories, issues/PRs, workflows, security, and more. Use when implementing GitHub integrations, automating operations, or building applicat
markpittsecurity
🛡️
Helm Chart Expert
Production-ready Helm chart creation and review guide. Covers chart structure, ArgoCD/GitOps integration, secrets management, testing strategies, deployment patterns (blue-green, canary), monitoring, and troubleshooting. Use when creating charts, reviewing for security/quality, integrating with Argo
merileysecurity
🛡️
Incident Response
Comprehensive incident response skill for security incident detection, containment, investigation, and recovery. Includes alert triage, severity classification, evidence collection, root cause analysis, and post-incident documentation with automated playbook execution.
rickydwilson-dcssecurity
🛡️
Injection Vulnerabilities
This skill analyzes AI-generated code to identify and explain injection vulnerabilities such as SQL injection, command injection, and XSS, with secure
securitycode-reviewaidatabase
🛡️
Javascript Best Practices
This skill helps you write and review JavaScript code by applying best-practice guidelines across performance, async patterns, security, and modern features.
performancesecuritycode-reviewdebugging
🛡️
Kali Docker Pentesting
Comprehensive pentesting toolkit using Kali Linux Docker container. Provides direct access to 200+ security tools without MCP overhead. Use when conducting security assessments, penetration testing, vulnerability scanning, or security research. Works via direct docker exec commands for maximum effic
kroeghasecurity
🛡️
Ln 621 Security Auditor
This skill audits codebases for security vulnerabilities, locating hardcoded secrets, injections, XSS, insecure dependencies, and missing input validation with
securitycode-reviewtestingbackend
🛡️
Ln 625 Dependencies Auditor
This skill audits dependencies and reuse across projects, detects outdated, unused, or risky packages and CVEs, and reports a compliance score.
automationsecuritydevopsbackend