Login
Download
Skill UI
Browse and discover
6044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Data Validation
, found
109
results
Default
Newest
Most Downloaded
Websocket Handler Setup
websocket-handler-setup
jeremylongshore/claude-code-plugins-plus-skills
101
Automates websocket handler setup for backend development, guiding Node.js, Python, and Go implementations while aligning with database, caching, messaging, and microservice architecture best practices to deliver production-ready code and validations.
View Details
Zeroization Audit Tool
zeroize-audit
trailofbits/skills
459
Detects missing zeroization of secrets and flags compiler-optimized removals with mandatory assembly/IR evidence, helping auditors verify C/C++/Rust cryptographic code through dataflow, CFG, and runtime validation.
View Details
cBioPortal Cancer Data
cbioportal-database
K-Dense-AI/claude-scientific-skills
131
Access multi-dimensional cancer genomics data via cBioPortal REST API for mutation, copy-number, expression, and survival insights across TCGA/GENIE studies, enabling target validation and clinical association analyses programmatically with Python clients.
View Details
Practical Typed Error Handling
fp-errors
sickn33/antigravity-awesome-skills
146
Showcases how to treat errors as data with fp-ts Either and TaskEither so TypeScript knows when operations fail, letting you chain validations without try/catch chaos.
View Details
FP React Patterns
fp-react
sickn33/antigravity-awesome-skills
406
Practical fp-ts patterns for React 18/19 and Next.js 14/15 that cover hooks, state, forms, validation, and data fetching with Option, Either, TaskEither, RemoteData, and pipe utilities.
View Details
Perl Security Guardrails
perl-security
affaan-m/everything-claude-code
354
Provides a Perl-centric security checklist covering taint mode, strict input validation, safe regex, file/command handling, and DBI parameterization to harden web and CLI applications before processing untrusted data.
View Details
Structured Output Extraction
llm-structured-output
sickn33/antigravity-awesome-skills
274
Teaches how to steer OpenAI, Anthropic, Google, and local LLMs into emitting validated JSON/enums by defining strict schemas, prompting for data extraction, handling validation failures, and building retry/logging pipelines.
View Details
Network Incident Traffic Analysis
analyzing-network-traffic-for-incidents
mukul975/Anthropic-Cybersecurity-Skills
105
Analyzes PCAP captures, Zeek logs, and NetFlow flow data to uncover command-and-control, lateral movement, and exfiltration during security incidents; supports packet-level validation and IOC extraction for triage and response teams.
View Details
Optimized RBAC Role Mining
building-role-mining-for-rbac-optimization
mukul975/Anthropic-Cybersecurity-Skills
236
Automates bottom-up and top-down RBAC role mining from existing user-permission data, using clustering, FCA, and graph heuristics to reduce role explosion, enforce least privilege, and produce candidate roles for governance validation.
View Details
API Schema Validation Security
implementing-api-schema-validation-security
mukul975/Anthropic-Cybersecurity-Skills
318
Implements API schema validation using OpenAPI/JSON Schema to enforce request and response contracts, block injections, eliminate mass assignment, and prevent data leakage across gateways and CI/CD pipelines.
View Details
Kubernetes Network Policy Implementation
implementing-network-policies-for-kubernetes
mukul975/Anthropic-Cybersecurity-Skills
294
Guided walkthrough covering Kubernetes NetworkPolicy rules—from default deny through DNS, application, cross-namespace, egress restriction, and metadata protection—plus validation commands for secure cluster traffic control.
View Details
AWS Cloud Pentest with Pacu
performing-cloud-penetration-testing-with-pacu
mukul975/Anthropic-Cybersecurity-Skills
267
Guides authorized AWS penetration testers through Pacu-based workflows for enumerating IAM, privilege escalation, data access, lateral movement, and detection validation to prove controls in scoped engagements.
View Details
Prev
1
2
3
...
6
7
8
9
10
Next
Language
简体中文
English