Login
Download
Skill UI
Browse and discover
6069+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Secrets
, found
113
results
Default
Newest
Most Downloaded
Vault Secrets Management
implementing-secrets-management-with-vault
mukul975/Anthropic-Cybersecurity-Skills
294
Deploy and configure HashiCorp Vault across clouds to replace hardcoded credentials with dynamic secrets, integrate with Kubernetes, CI/CD, and cloud providers, and enforce centralized auditing and auto-rotation for databases and IAM keys.
View Details
CI/CD Secrets Scanning
implementing-secrets-scanning-in-ci-cd
mukul975/Anthropic-Cybersecurity-Skills
358
Automates gitleaks and trufflehog scans in CI/CD pipelines to catch API keys, tokens, passwords, and similar credentials before deployment, gating builds whenever high-severity secrets are detected.
View Details
Laravel Security Playbook
laravel-security
affaan-m/everything-claude-code
369
A consolidated guide outlining Laravel security hardening: auth/authz, validation, CSRF, file uploads, secrets, rate limiting, headers, and deployment safeguards to keep applications resilient.
View Details
MobSF Android Static Analysis
performing-android-app-static-analysis-with-mobsf
mukul975/Anthropic-Cybersecurity-Skills
394
Automates MobSF-powered Android static app scans to flag hardcoded secrets, insecure permissions, and weak cryptography before deployment or during pen tests and CI/CD security gates.
View Details
Trivy Container Security Scan
performing-container-security-scanning-with-trivy
mukul975/Anthropic-Cybersecurity-Skills
397
Use Aqua Security Trivy to scan container images, filesystems, and Kubernetes manifests for vulnerabilities, misconfigurations, secrets, and licensing issues while generating CycloneDX/SPDX SBOMs and CI/CD reports.
View Details
Cryptographic Audit Automation
performing-cryptographic-audit-of-application
mukul975/Anthropic-Cybersecurity-Skills
332
Automates a cryptographic audit by scanning Python and configuration files for weak hashes, insecure cipher modes, hardcoded secrets, and TLS misconfigurations, then generating a structured report with findings and remediations.
View Details
Kubernetes Etcd Security Audit
performing-kubernetes-etcd-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
327
Guide to assess Kubernetes etcd clusters by verifying encryption at rest, TLS transport, access controls, encrypted backups, network isolation, and CIS benchmark expectations for control-plane secrets.
View Details
Paste Site Leak Monitor
performing-paste-site-monitoring-for-credentials
mukul975/Anthropic-Cybersecurity-Skills
328
Automates monitoring of Pastebin, GitHub Gists, and similar paste sites for leaked credentials, API keys, and sensitive data using keyword matching, regex patterns, and API scraping so SOCs can detect breaches before adversaries weaponize stolen secrets.
View Details
Serverless Function Security Review
performing-serverless-function-security-review
mukul975/Anthropic-Cybersecurity-Skills
381
Guides security teams through auditing AWS Lambda, Azure Functions, and GCP Cloud Functions to detect excessive execution permissions, exposed secrets, insecure runtime settings, and missing runtime protections before deployment or compliance checks.
View Details
Service Account Rotation
performing-service-account-credential-rotation
mukul975/Anthropic-Cybersecurity-Skills
244
Automates periodic service account credential rotation across Active Directory, cloud providers, and databases, ensuring secrets are renewed, propagated, and validated to minimize stale keys and compromise risk.
View Details
Secure GitHub Actions
securing-github-actions-workflows
mukul975/Anthropic-Cybersecurity-Skills
449
Hardens GitHub Actions workflows by pinning actions to SHAs, limiting GITHUB_TOKEN permissions, shielding secrets, blocking script injection, and enforcing reviewer approvals so CI/CD pipelines resist supply-chain and privilege attacks.
View Details
Secure Helm Deployments
securing-helm-chart-deployments
mukul975/Anthropic-Cybersecurity-Skills
483
Helps operators secure Helm chart releases by verifying provenance, scanning rendered templates, enforcing hardened security contexts, managing secrets externally, and applying RBAC controls in CI/CD pipelines before deployment.
View Details
Prev
1
2
3
...
6
7
8
9
10
Next
Language
简体中文
English