Cybersecurity Skills Bundle | Prompeteer.ai

Security auditing, vulnerability assessment, compliance frameworks, secure coding practices, and incident response skills.

Included Skills (80)

  1. Compliance Audit Logging — This skill helps developers implement tamper-evident audit logs for compliance with standards like SOC 2, HIPAA, and PCI DSS.
  2. ISO27001 Compliance Assistant — This skill helps information security managers implement and maintain ISO27001 standards, ensuring robust data protection and compliance.
  3. Attack Tree Modeler — This skill helps security professionals visualize threat paths by building attack trees to identify security gaps and prioritize mitigations.
  4. Attack Tree Visualizer — This skill constructs attack trees to visualize threat paths, assisting security professionals in risk assessment and mitigation planning.
  5. Robot Security Hardening — This skill hardens robotic systems by implementing security best practices for ROS2, DDS, network segmentation, and secrets management.
  6. ISO27001 Security Manager — This skill assists Information Security Managers in implementing and maintaining ISO27001 standards for robust information security management systems.
  7. WCAG Contrast Checker — This skill checks color contrast ratios against WCAG guidelines, helping designers and developers ensure UI accessibility compliance.
  8. Security Audit Agent — This skill performs comprehensive security audits, threat modeling, and hardening for software and infrastructure projects, aiding security professionals.
  9. Security Audit Agent — This skill conducts security audits, threat modeling, and provides hardening recommendations for software and infrastructure projects, aiding security professionals.
  10. Skill Quality Auditor — Analyzes agent skills to identify areas for improvement, providing data-driven suggestions to enhance skill selection and performance.
  11. Claude Context Optimizer — This skill audits and improves CLAUDE.md files, optimizing project context for Claude code and assisting developers in project memory management.
  12. Autonomous Pentesting Agent — This skill autonomously performs web application penetration tests using AI and security tools, aiding security professionals and DevOps teams.
  13. Claude Context Optimizer — This skill audits and improves CLAUDE.md files, providing developers with optimized project context for Claude Code and enhanced project memory.
  14. Autonomous Pentesting Agent — This skill autonomously conducts web application penetration tests using AI and security tools, assisting security engineers and DevOps teams.
  15. Tamper-Proof Audit Logs — Implement tamper-evident audit logs for compliance, helping developers build compliance audit trails and immutable event logs that meet regulatory retention requirements.
  16. DevSecOps FinOps Guardrails — This skill automates security and financial audits, helping DevSecOps and FinOps teams maintain compliance and control costs.
  17. DevSecOps FinOps Guardrails — This skill automates security and financial audits, helping DevSecOps and FinOps teams maintain compliance and control costs.
  18. Workflow Guided Execution — This skill guides users through complex tasks by orchestrating Antigravity skills in pre-defined workflows for common scenarios.
  19. accessibility-compliance-accessibility-audit — You are an accessibility expert specializing in WCAG compliance, inclusive design, and assistive technology compatibility. Conduct audits, identify barriers, and provide remediation guidance.
  20. Guided Workflow Execution — This skill orchestrates Antigravity skills through guided workflows, helping users complete complex tasks like SaaS delivery.
  21. Contract Risk Analyzer — This skill analyzes contracts to identify risks, check completeness, and provide actionable recommendations for users reviewing legal agreements.
  22. Data Quality Validator — This skill validates data quality in various formats, identifying issues like missing values and schema violations to assist data engineers.
  23. AWS Penetration Techniques — This skill aids red teams and security professionals in penetration testing AWS environments, uncovering vulnerabilities and potential exploits within the cloud infrastructure.
  24. AWS Penetration Techniques — This skill aids red teams and security professionals in penetration testing AWS environments, uncovering vulnerabilities and potential exploits within the cloud infrastructure.
  25. Granular Context Builder — This skill enables line-by-line code analysis, helping AI coding agents build deep architectural context for security audits and reviews.
  26. AI Engineering Workflows — This skill offers six structured AI engineering workflows, such as prompt evaluation and security audits, for AI engineers building reliable AI systems.
  27. WCAG Compliance Auditor — This skill audits web pages and components for WCAG 2.2 compliance, providing actionable fixes to help developers build accessible web experiences.
  28. Agentic Action Auditor — This skill audits GitHub Actions workflows for security vulnerabilities in AI agent integrations, helping developers secure their CI/CD pipelines.
  29. Deep Code Analyzer — This skill performs detailed, line-by-line code analysis, building deep architectural context for developers and security auditors.
  30. WCAG Compliance Auditor — This skill audits web pages and UI components for WCAG 2.2 compliance, providing actionable fixes for developers to improve accessibility.
  31. Actions Security Auditor — This skill audits GitHub Actions workflows for security vulnerabilities in AI agent integrations, assisting developers in securing their CI/CD pipelines.
  32. API Vulnerability Finder — This skill helps security researchers and bug bounty hunters identify API vulnerabilities through comprehensive fuzzing and exploitation techniques.
  33. API Security Workflow — This skill provides a comprehensive API security testing workflow covering authentication, authorization, and vulnerability assessments for developers and security engineers.
  34. AI Metadata Stamper — This skill stamps files with trust scores, provenance, and compliance metadata, assisting users with AI governance and auditing needs.
  35. Web Vulnerability Scanner — Analyze web application security using Burp Suite to identify vulnerabilities and improve security for developers and security professionals.
  36. AWS Bedrock Interface — Deploys and manages foundation models on AWS Bedrock, enabling developers to leverage enterprise-grade AI with compliance and security.
  37. Azure OpenAI Service — Deploy OpenAI models like GPT-4o on Azure with enterprise compliance, data residency, and Azure-native authentication for enhanced security.
  38. Dependency Audit Tool — Analyzes project dependencies for outdated packages, security vulnerabilities, and breaking changes, providing upgrade plans for developers.
  39. Wireless Security Auditor — Audit Wi-Fi networks using aircrack-ng to assess security and identify vulnerabilities for authorized network administrators and security professionals.
  40. Checkov Security Scanner — Offers expert guidance on using Checkov to scan infrastructure-as-code for security and compliance issues, benefiting developers and DevOps teams.
  41. Active Directory Exploitation — Provides techniques for attacking Active Directory, assisting red teams and penetration testers in security assessments.
  42. Wireless Security Auditor — Audit Wi-Fi networks using aircrack-ng to assess security and identify vulnerabilities for authorized network administrators and security professionals.
  43. Checkov Security Scanner — This skill provides expert guidance on using Checkov to scan infrastructure-as-code for security and compliance issues, assisting developers.
  44. Active Directory Exploitation — Provides techniques for attacking Active Directory environments, aiding red teams and penetration testers in security assessments.
  45. Subdomain Discovery Tool — This skill uses OWASP Amass to enumerate subdomains and map network infrastructure, aiding security professionals in attack surface discovery.
  46. Censys Search Engine — Censys helps security researchers and analysts discover internet-connected hosts, TLS certificates, and domains for attack surface monitoring and reconnaissance.
  47. Amass Network Discovery — This skill leverages OWASP Amass to perform comprehensive network mapping and subdomain enumeration for security professionals and researchers.
  48. TLS Certificate Automation — Automate TLS certificate issuance and management in Kubernetes using cert-manager, simplifying security for DevOps and platform engineers.
  49. Amass Network Discovery — This skill leverages OWASP Amass to perform comprehensive network mapping and subdomain enumeration for security assessments and research.
  50. Incident Response Coordinator — This skill assists engineering teams in coordinating and managing incident responses, facilitating communication and efficient resolution.
  51. Auth System Implementer — This skill helps developers implement authentication and authorization systems, including OAuth, RBAC, and session management, for web applications.
  52. Web Security Testing — This skill uses Burp Suite to test web application security, helping users intercept traffic and identify vulnerabilities.
  53. CCPA Compliance Assistant — Helps businesses handling California resident data comply with CCPA/CPRA regulations when building privacy features or responding to data subject requests.
  54. Technical Quality Auditor — This skill runs technical quality checks, generating a scored report with actionable plans, to help developers identify and address code-level issues.
  55. API Security Implementer — Guides developers in implementing secure API design patterns and protecting against common API vulnerabilities.
  56. Incident Response Automation — Automates incident response tasks, helping DevOps engineers and SREs resolve critical system issues efficiently.
  57. Data Quality Auditor — This skill helps data engineers and analysts automatically identify and report data quality issues within datasets, ensuring reliable data pipelines.
  58. Authentication System Designer — Designs and implements authentication/authorization systems for web applications, including OAuth integration, session management, and role-based access control, aiding developers.
  59. Auth System Implementation — Implements authentication and authorization for web applications, including OAuth, session management, and role-based access control, assisting developers with secure access.
  60. API Security Workflow — This skill tests REST and GraphQL API security, including authentication, authorization, and input validation, to help developers secure their APIs.
  61. Cosign Security Assistant — Provides expert guidance on using Cosign to sign, verify, and manage container images, enhancing software supply chain security for developers.
  62. Auth.js Expert — Assists developers in implementing authentication using Auth.js with OAuth providers, session management, and middleware protection across various web frameworks.
  63. CrowdSec Server Protection — Protect servers using CrowdSec to block malicious IPs, detect attacks, and set up a community-driven firewall.
  64. Cognito Authentication Skill — This skill automates Amazon Cognito authentication implementation, assisting developers with user pools, identity pools, and JWT token management.
  65. Skill Creation Engineer — This skill designs, writes, and deploys new skills within the repository, adhering to the Diamond Standard.
  66. Slash Command Factory — Generate custom Claude Code slash commands through intelligent 5-7 question flow. Creates powerful commands for business research, content analysis, healthcare compliance, API integration, documentation automation, and workflow optimization. Outputs organized commands to generated-commands/ with validation and installation guidance.
  67. Stack Evaluation Tool — Evaluates and compares technology stacks, providing data-driven recommendations for engineering teams with TCO and security analysis.
  68. Arcjet Security Assistant — Provides expert guidance for Arcjet, a developer-first security platform, helping developers add security layers to JavaScript/TypeScript applications without infrastructure management.
  69. Design System Normalizer — This skill audits and realigns UI features to match design system standards, ensuring consistency for designers and developers.
  70. Agent Execution Sandbox — Safely execute AI agent code with resource limits, audit trails, and kill switches, protecting systems from unintended actions.
  71. AI Content Detector — This skill detects AI-generated text using multiple methods, assisting editors, educators, and SEO specialists in content auditing.
  72. Drawing Data Extractor — This skill parses architectural drawings and compliance documents using Vision AI, extracting key building data for architects and engineers.
  73. Auth Implementation Assistant — Helps developers implement authentication, login/signup, OAuth, and session management in TypeScript applications across various frameworks.
  74. TLS Certificate Manager — Automates TLS certificate management within Kubernetes, enabling users to easily issue, renew, and manage certificates from various Certificate Authorities.
  75. Cloudflare Website Protection — Integrate Cloudflare to protect and accelerate websites by adding CDN, DDoS protection, DNS management, SSL, WAF, and edge computing.
  76. GDPR Cookie Consent — Implement GDPR/ePrivacy-compliant cookie consent management for websites, helping developers achieve compliance and manage user preferences effectively.
  77. Schema Design Expert — This skill designs optimized database schemas, including tables, relationships, and security policies, assisting developers and database administrators.
  78. Automated Database Backup — Automate database backups, restores, and disaster recovery for PostgreSQL, MySQL, MongoDB, and Redis, ensuring data safety and availability.
  79. AI Format Converter — This skill converts human-written instructions into a structured format, improving AI compliance and reducing token usage.
  80. Reverse Engineering Techniques — This skill helps security researchers and authorized personnel analyze software protections and understand anti-reversing techniques for legitimate purposes.