security-auditor
Continuous security vulnerability scanning for OWASP Top 10, common vulnerabilities, and insecure patterns. Use when reviewing code, before deployments, or on file changes. Scans for SQL injection, XSS, secrets exposure, auth issues. Triggers on file changes, security mentions, deployment prep.
47
21
2025年10月28日 16:14
alirezarezvani
alirezarezvani/claude-code-tresor下载技能文件
下载包含 SKILL.md 和所有相关文件的完整技能目录
相关技能
senior-secops
alirezarezvani
Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices. Includes security scanning, vulnerability assessment, compliance checking, and security automation. Use when implementing security controls, conducting security audits, responding to vulnerabilities, or ensuring compliance requirements.
information-security-manager-iso27001
alirezarezvani
Senior Information Security Manager specializing in ISO 27001 and ISO 27002 implementation for HealthTech and MedTech companies. Provides ISMS implementation, cybersecurity risk assessment, security controls management, and compliance oversight. Use for ISMS design, security risk assessments, control implementation, and ISO 27001 certification activities.
social-media-analyzer
alirezarezvani
Analyzes social media campaign performance across platforms with engagement metrics, ROI calculations, and audience insights for data-driven marketing decisions
api-integration-builder
Toowiredd
Generates production-ready API clients with TypeScript types, retry logic, rate limiting, authentication (OAuth, API keys), error handling, and mock responses. Use when user says "integrate API", "API client", "connect to service", or requests third-party service integration.
dependency-auditor
CuriousLearner
Automated security auditing of project dependencies to identify known vulnerabilities.
complexity-analyzer
CuriousLearner
Measure and report code complexity metrics with actionable recommendations.
auth-analyzer
CuriousLearner
Review and analyze authentication and authorization patterns for security vulnerabilities.
compliance-checker
CuriousLearner
Check code against security compliance standards and best practices.
observability-monitoring
manutej
Comprehensive observability and monitoring skill covering Prometheus, Grafana, metrics collection, alerting, exporters, PromQL, and production monitoring patterns for distributed systems and cloud-native applications
oauth2-authentication
manutej
Comprehensive OAuth2 authentication skill covering authorization flows, token management, PKCE, OpenID Connect, and security best practices for modern authentication systems
managing-bd-tasks
withzombies
Use for advanced bd operations beyond basic create/close - splitting tasks mid-flight, merging duplicates, changing dependencies, archiving epics, querying for metrics, managing cross-epic dependencies
security-patterns
masanao-ohba
PHP security best practices and patterns for preventing common vulnerabilities