Login
Download
Skill UI
Browse and discover
7039+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
runtime
, found
74
results
Default
Newest
Most Downloaded
Container Drift Runtime Detection
detecting-container-drift-at-runtime
mukul975/Anthropic-Cybersecurity-Skills
167
Detecting runtime container drift by tracking unauthorized binaries, filesystem writes, package installs, and configuration deviations from original images, enabling SOC analysts to hunt threats and validate Kubernetes workload integrity with tools like Falco.
View Details
Container Escape Detection
detecting-container-escape-attempts
mukul975/Anthropic-Cybersecurity-Skills
372
Blueprint for using runtime monitoring (Falco, auditd, custom rules) to spot namespace/capability abuse, sensitive mounts, and syscalls that signal container escape attempts.
View Details
Falco Container Escape Detection
detecting-container-escape-with-falco-rules
mukul975/Anthropic-Cybersecurity-Skills
482
Uses Falco runtime security rules to monitor syscalls, file access, and privilege escalations for detecting container escape attempts across Kubernetes and standalone Linux deployments.
View Details
Cloud Cryptomining Detection
detecting-cryptomining-in-cloud
mukul975/Anthropic-Cybersecurity-Skills
329
Guides security teams through multi-signal detection of unauthorized cryptocurrency mining in cloud workloads, combining cost, compute, network, GuardDuty, and runtime monitoring with alerting and remediation.
View Details
Kubernetes Privilege Escalation Detection
detecting-privilege-escalation-in-kubernetes-pods
mukul975/Anthropic-Cybersecurity-Skills
106
Monitors Kubernetes pods for privilege escalation by combining admission controls (Pod Security Admission, OPA Gatekeeper) with Falco runtime rules on capabilities, setuid binaries, and namespace usage so SOC analysts can block risky containers and hunt threats.
View Details
Docker Container Hardening
hardening-docker-containers-for-production
mukul975/Anthropic-Cybersecurity-Skills
471
Guides applying CIS Docker Benchmark best practices across daemon, image, runtime, and host auditing so teams can minimize attack surface, enforce least privilege, and verify secure production deployments.
View Details
API Posture Management
implementing-api-security-posture-management
mukul975/Anthropic-Cybersecurity-Skills
156
Helps continuously discover, classify, and risk-score every API while enforcing policies and aggregating findings from gateways, CI/CD, and runtime tooling to maintain an organization’s API security posture.
View Details
API Security Testing 42Crunch
implementing-api-security-testing-with-42crunch
mukul975/Anthropic-Cybersecurity-Skills
58
Use 42Crunch to run static API Audit and dynamic conformance scans on OpenAPI specs, integrating with IDEs and CI/CD pipelines to detect OWASP API Top 10 issues before deployment and maintain runtime compliance.
View Details
Cloud Workload Protection
implementing-cloud-workload-protection
mukul975/Anthropic-Cybersecurity-Skills
497
Implements runtime protection for EC2/GCE workloads using boto3 and Google Cloud APIs; monitors processes, files, networks, and resource usage to detect cryptomining, reverse shells, and unauthorized binaries during security deployments.
View Details
Runtime Application Protection
implementing-runtime-application-self-protection
mukul975/Anthropic-Cybersecurity-Skills
319
Deploy RASP agents for Java and Python web apps to detect and block OWASP Top 10 attacks from inside the runtime, tune detection policies, baseline behavior, and forward telemetry to SIEM for comprehensive audit and response.
View Details
Runtime Security with Tetragon
implementing-runtime-security-with-tetragon
mukul975/Anthropic-Cybersecurity-Skills
403
Implement eBPF-powered runtime security observability and enforcement in Kubernetes with Cilium Tetragon, letting teams define TracingPolicy CRDs, monitor process/file/network activities, and block threats before they escape containers.
View Details
ZAP DAST Pipeline Integration
integrating-dast-with-owasp-zap-in-pipeline
mukul975/Anthropic-Cybersecurity-Skills
301
Explains configuring OWASP ZAP baseline, full, and API scans within CI/CD pipelines, tuning scan policies, interpreting findings, and gating deployments through GitHub Actions or GitLab CI to ensure runtime vulnerabilities are caught before release.
View Details
Prev
1
2
3
4
5
6
7
Next
Language
简体中文
English