Cybersecurity Skills Bundle | Prompeteer.ai
Security auditing, vulnerability assessment, compliance frameworks, secure coding practices, and incident response skills.
Included Skills (80)
- Compliance Audit Logging — This skill helps developers implement tamper-evident audit logs for compliance with standards like SOC 2, HIPAA, and PCI DSS.
- ISO27001 Compliance Assistant — This skill helps information security managers implement and maintain ISO27001 standards, ensuring robust data protection and compliance.
- Attack Tree Modeler — This skill helps security professionals visualize threat paths by building attack trees to identify security gaps and prioritize mitigations.
- Attack Tree Visualizer — This skill constructs attack trees to visualize threat paths, assisting security professionals in risk assessment and mitigation planning.
- Robot Security Hardening — This skill hardens robotic systems by implementing security best practices for ROS2, DDS, network segmentation, and secrets management.
- ISO27001 Security Manager — This skill assists Information Security Managers in implementing and maintaining ISO27001 standards for robust information security management systems.
- WCAG Contrast Checker — This skill checks color contrast ratios against WCAG guidelines, helping designers and developers ensure UI accessibility compliance.
- Security Audit Agent — This skill performs comprehensive security audits, threat modeling, and hardening for software and infrastructure projects, aiding security professionals.
- Security Audit Agent — This skill conducts security audits, threat modeling, and provides hardening recommendations for software and infrastructure projects, aiding security professionals.
- Skill Quality Auditor — Analyzes agent skills to identify areas for improvement, providing data-driven suggestions to enhance skill selection and performance.
- Claude Context Optimizer — This skill audits and improves CLAUDE.md files, optimizing project context for Claude code and assisting developers in project memory management.
- Autonomous Pentesting Agent — This skill autonomously performs web application penetration tests using AI and security tools, aiding security professionals and DevOps teams.
- Claude Context Optimizer — This skill audits and improves CLAUDE.md files, providing developers with optimized project context for Claude Code and enhanced project memory.
- Autonomous Pentesting Agent — This skill autonomously conducts web application penetration tests using AI and security tools, assisting security engineers and DevOps teams.
- Tamper-Proof Audit Logs — Implement tamper-evident audit logs for compliance, helping developers build compliance audit trails and immutable event logs that meet regulatory retention requirements.
- DevSecOps FinOps Guardrails — This skill automates security and financial audits, helping DevSecOps and FinOps teams maintain compliance and control costs.
- DevSecOps FinOps Guardrails — This skill automates security and financial audits, helping DevSecOps and FinOps teams maintain compliance and control costs.
- Workflow Guided Execution — This skill guides users through complex tasks by orchestrating Antigravity skills in pre-defined workflows for common scenarios.
- accessibility-compliance-accessibility-audit — You are an accessibility expert specializing in WCAG compliance, inclusive design, and assistive technology compatibility. Conduct audits, identify barriers, and provide remediation guidance.
- Guided Workflow Execution — This skill orchestrates Antigravity skills through guided workflows, helping users complete complex tasks like SaaS delivery.
- Contract Risk Analyzer — This skill analyzes contracts to identify risks, check completeness, and provide actionable recommendations for users reviewing legal agreements.
- Data Quality Validator — This skill validates data quality in various formats, identifying issues like missing values and schema violations to assist data engineers.
- AWS Penetration Techniques — This skill aids red teams and security professionals in penetration testing AWS environments, uncovering vulnerabilities and potential exploits within the cloud infrastructure.
- AWS Penetration Techniques — This skill aids red teams and security professionals in penetration testing AWS environments, uncovering vulnerabilities and potential exploits within the cloud infrastructure.
- Granular Context Builder — This skill enables line-by-line code analysis, helping AI coding agents build deep architectural context for security audits and reviews.
- AI Engineering Workflows — This skill offers six structured AI engineering workflows, such as prompt evaluation and security audits, for AI engineers building reliable AI systems.
- WCAG Compliance Auditor — This skill audits web pages and components for WCAG 2.2 compliance, providing actionable fixes to help developers build accessible web experiences.
- Agentic Action Auditor — This skill audits GitHub Actions workflows for security vulnerabilities in AI agent integrations, helping developers secure their CI/CD pipelines.
- Deep Code Analyzer — This skill performs detailed, line-by-line code analysis, building deep architectural context for developers and security auditors.
- WCAG Compliance Auditor — This skill audits web pages and UI components for WCAG 2.2 compliance, providing actionable fixes for developers to improve accessibility.
- Actions Security Auditor — This skill audits GitHub Actions workflows for security vulnerabilities in AI agent integrations, assisting developers in securing their CI/CD pipelines.
- API Vulnerability Finder — This skill helps security researchers and bug bounty hunters identify API vulnerabilities through comprehensive fuzzing and exploitation techniques.
- API Security Workflow — This skill provides a comprehensive API security testing workflow covering authentication, authorization, and vulnerability assessments for developers and security engineers.
- AI Metadata Stamper — This skill stamps files with trust scores, provenance, and compliance metadata, assisting users with AI governance and auditing needs.
- Web Vulnerability Scanner — Analyze web application security using Burp Suite to identify vulnerabilities and improve security for developers and security professionals.
- AWS Bedrock Interface — Deploys and manages foundation models on AWS Bedrock, enabling developers to leverage enterprise-grade AI with compliance and security.
- Azure OpenAI Service — Deploy OpenAI models like GPT-4o on Azure with enterprise compliance, data residency, and Azure-native authentication for enhanced security.
- Dependency Audit Tool — Analyzes project dependencies for outdated packages, security vulnerabilities, and breaking changes, providing upgrade plans for developers.
- Wireless Security Auditor — Audit Wi-Fi networks using aircrack-ng to assess security and identify vulnerabilities for authorized network administrators and security professionals.
- Checkov Security Scanner — Offers expert guidance on using Checkov to scan infrastructure-as-code for security and compliance issues, benefiting developers and DevOps teams.
- Active Directory Exploitation — Provides techniques for attacking Active Directory, assisting red teams and penetration testers in security assessments.
- Wireless Security Auditor — Audit Wi-Fi networks using aircrack-ng to assess security and identify vulnerabilities for authorized network administrators and security professionals.
- Checkov Security Scanner — This skill provides expert guidance on using Checkov to scan infrastructure-as-code for security and compliance issues, assisting developers.
- Active Directory Exploitation — Provides techniques for attacking Active Directory environments, aiding red teams and penetration testers in security assessments.
- Subdomain Discovery Tool — This skill uses OWASP Amass to enumerate subdomains and map network infrastructure, aiding security professionals in attack surface discovery.
- Censys Search Engine — Censys helps security researchers and analysts discover internet-connected hosts, TLS certificates, and domains for attack surface monitoring and reconnaissance.
- Amass Network Discovery — This skill leverages OWASP Amass to perform comprehensive network mapping and subdomain enumeration for security professionals and researchers.
- TLS Certificate Automation — Automate TLS certificate issuance and management in Kubernetes using cert-manager, simplifying security for DevOps and platform engineers.
- Amass Network Discovery — This skill leverages OWASP Amass to perform comprehensive network mapping and subdomain enumeration for security assessments and research.
- Incident Response Coordinator — This skill assists engineering teams in coordinating and managing incident responses, facilitating communication and efficient resolution.
- Auth System Implementer — This skill helps developers implement authentication and authorization systems, including OAuth, RBAC, and session management, for web applications.
- Web Security Testing — This skill uses Burp Suite to test web application security, helping users intercept traffic and identify vulnerabilities.
- CCPA Compliance Assistant — Helps businesses handling California resident data comply with CCPA/CPRA regulations when building privacy features or responding to data subject requests.
- Technical Quality Auditor — This skill runs technical quality checks, generating a scored report with actionable plans, to help developers identify and address code-level issues.
- API Security Implementer — Guides developers in implementing secure API design patterns and protecting against common API vulnerabilities.
- Incident Response Automation — Automates incident response tasks, helping DevOps engineers and SREs resolve critical system issues efficiently.
- Data Quality Auditor — This skill helps data engineers and analysts automatically identify and report data quality issues within datasets, ensuring reliable data pipelines.
- Authentication System Designer — Designs and implements authentication/authorization systems for web applications, including OAuth integration, session management, and role-based access control, aiding developers.
- Auth System Implementation — Implements authentication and authorization for web applications, including OAuth, session management, and role-based access control, assisting developers with secure access.
- API Security Workflow — This skill tests REST and GraphQL API security, including authentication, authorization, and input validation, to help developers secure their APIs.
- Cosign Security Assistant — Provides expert guidance on using Cosign to sign, verify, and manage container images, enhancing software supply chain security for developers.
- Auth.js Expert — Assists developers in implementing authentication using Auth.js with OAuth providers, session management, and middleware protection across various web frameworks.
- CrowdSec Server Protection — Protect servers using CrowdSec to block malicious IPs, detect attacks, and set up a community-driven firewall.
- Cognito Authentication Skill — This skill automates Amazon Cognito authentication implementation, assisting developers with user pools, identity pools, and JWT token management.
- Skill Creation Engineer — This skill designs, writes, and deploys new skills within the repository, adhering to the Diamond Standard.
- Slash Command Factory — Generate custom Claude Code slash commands through intelligent 5-7 question flow. Creates powerful commands for business research, content analysis, healthcare compliance, API integration, documentation automation, and workflow optimization. Outputs organized commands to generated-commands/ with validation and installation guidance.
- Stack Evaluation Tool — Evaluates and compares technology stacks, providing data-driven recommendations for engineering teams with TCO and security analysis.
- Arcjet Security Assistant — Provides expert guidance for Arcjet, a developer-first security platform, helping developers add security layers to JavaScript/TypeScript applications without infrastructure management.
- Design System Normalizer — This skill audits and realigns UI features to match design system standards, ensuring consistency for designers and developers.
- Agent Execution Sandbox — Safely execute AI agent code with resource limits, audit trails, and kill switches, protecting systems from unintended actions.
- AI Content Detector — This skill detects AI-generated text using multiple methods, assisting editors, educators, and SEO specialists in content auditing.
- Drawing Data Extractor — This skill parses architectural drawings and compliance documents using Vision AI, extracting key building data for architects and engineers.
- Auth Implementation Assistant — Helps developers implement authentication, login/signup, OAuth, and session management in TypeScript applications across various frameworks.
- TLS Certificate Manager — Automates TLS certificate management within Kubernetes, enabling users to easily issue, renew, and manage certificates from various Certificate Authorities.
- Cloudflare Website Protection — Integrate Cloudflare to protect and accelerate websites by adding CDN, DDoS protection, DNS management, SSL, WAF, and edge computing.
- GDPR Cookie Consent — Implement GDPR/ePrivacy-compliant cookie consent management for websites, helping developers achieve compliance and manage user preferences effectively.
- Schema Design Expert — This skill designs optimized database schemas, including tables, relationships, and security policies, assisting developers and database administrators.
- Automated Database Backup — Automate database backups, restores, and disaster recovery for PostgreSQL, MySQL, MongoDB, and Redis, ensuring data safety and availability.
- AI Format Converter — This skill converts human-written instructions into a structured format, improving AI compliance and reducing token usage.
- Reverse Engineering Techniques — This skill helps security researchers and authorized personnel analyze software protections and understand anti-reversing techniques for legitimate purposes.