Login
Download
Skill UI
Browse and discover
7087+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
secrets
, found
130
results
Default
Newest
Most Downloaded
HashiCorp Boundary Zero Trust
implementing-zero-trust-with-hashicorp-boundary
mukul975/Anthropic-Cybersecurity-Skills
194
Implement HashiCorp Boundary to provide identity-aware zero trust access to infrastructure resources, tying into Vault for dynamic credential brokering, session recording, and hierarchical scopes so operators deliver just-in-time access without exposing secrets.
View Details
Laravel Security Best Practices
laravel-security
affaan-m/everything-claude-code
126
Comprehensive guide for hardening Laravel applications with auth/authorization, validation, CSRF, file handling, rate limiting, secrets, and deployment safeguards.
View Details
MobSF Android Static Scan
performing-android-app-static-analysis-with-mobsf
mukul975/Anthropic-Cybersecurity-Skills
242
Automate MobSF-powered static analysis for Android APK/AAB files to uncover hardcoded secrets, misconfigurations, risky permissions, and weak cryptography before deployment or during pentests, and gate CI/CD pipelines with measurable security scores.
View Details
Trivy Container Security Scanning
performing-container-security-scanning-with-trivy
mukul975/Anthropic-Cybersecurity-Skills
265
Uses Aqua Security Trivy to scan container images, filesystems, IaC, and Kubernetes manifests for vulnerabilities, secrets, and license issues while generating SBOMs and integrating into CI/CD pipelines for triage-ready reports.
View Details
Cryptographic Audit Automation
performing-cryptographic-audit-of-application
mukul975/Anthropic-Cybersecurity-Skills
193
Automated skill that scans Python and configuration files to review cryptographic primitives, insecure modes, embedded secrets, and TLS settings, flagging weaknesses and producing structured remediation reports during app security assessments.
View Details
Kubernetes Etcd Security Assessment
performing-kubernetes-etcd-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
456
Guides operators through auditing etcd encryption, TLS transport, access controls, backup protection, and network isolation in Kubernetes clusters so secrets stay shielded even if the control plane is targeted.
View Details
Serverless Function Security Review
performing-serverless-function-security-review
mukul975/Anthropic-Cybersecurity-Skills
361
A guided workflow for auditing AWS Lambda, Azure Functions, and GCP Cloud Functions to catch permissive execution roles, exposed secrets, and missing runtime protections before deployment.
View Details
Service Account Rotation Automation
performing-service-account-credential-rotation
mukul975/Anthropic-Cybersecurity-Skills
203
Automates scheduled rotation of service account credentials across AD, cloud IAM, and application stores, updating all consumers, verifying health, and retiring old secrets to reduce compromise risk.
View Details
Frida iOS Reverse Engineering
reverse-engineering-ios-app-with-frida
mukul975/Anthropic-Cybersecurity-Skills
75
Instrument iOS apps with Frida to reverse engineer binaries, inspect Objective-C/Swift runtime flows, extract secrets, and evaluate or bypass security controls during authorized mobile penetration testing.
View Details
Trivy Docker Image Scans
scanning-docker-images-with-trivy
mukul975/Anthropic-Cybersecurity-Skills
413
Use Trivy to scan Docker and OCI images for OS/library CVEs, secrets, misconfigurations, licenses, and SBOM data; integrates with CI/CD pipelines and exports SARIF/JSON/CycloneDX for policy enforcement.
View Details
Secure GitHub Actions Workflows
securing-github-actions-workflows
mukul975/Anthropic-Cybersecurity-Skills
66
Guides DevSecOps teams to harden GitHub Actions by pinning actions to SHAs, restricting GITHUB_TOKEN permissions, guarding secrets, avoiding script injection, and enforcing workflow change approvals.
View Details
Secure Helm Chart Deployments
securing-helm-chart-deployments
mukul975/Anthropic-Cybersecurity-Skills
444
Validates Helm chart provenance, scans rendered templates for misconfigurations, enforces pod security contexts, and hardens RBAC/secrets workflows so Kubernetes deployments stay compliant.
View Details
Prev
1
2
3
...
7
8
9
10
11
Next
Language
简体中文
English