github.com/briiirussell/cybersecurity-skills
Skill | Added | Review |
|---|---|---|
recon Perform structured reconnaissance and attack surface enumeration for authorized penetration tests, CTF challenges, and bug bounty programs. Use when the user mentions 'recon,' 'reconnaissance,' 'enumerate,' 'attack surface,' 'subdomain enumeration,' 'port scan,' 'fingerprint,' 'asset discovery,' or needs to map a target's external footprint. | 72 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 2400590 | |
osint-recon Gather and correlate open source intelligence from public sources for authorized investigations, threat intelligence, and attack surface assessment. Use when the user mentions 'OSINT,' 'open source intelligence,' 'digital footprint,' 'public records,' 'threat intelligence,' 'investigate a domain,' or needs to research a target using publicly available data. | 60 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 2400590 | |
owasp-audit Audit application source code against the OWASP Top 10 vulnerability categories. Use when the user mentions 'OWASP,' 'security audit,' 'code security review,' 'vulnerability audit,' 'find vulnerabilities,' 'secure code review,' 'security review,' or wants to check their codebase for common security weaknesses. | 64 Impact — No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 2400590 | |
prompt-injection Audit applications for AI prompt injection, agent security, and LLM permission boundary vulnerabilities. Use when the user mentions 'prompt injection,' 'LLM security,' 'AI security,' 'jailbreak,' 'indirect prompt injection,' 'prompt leaking,' 'AI red team,' 'LLM vulnerabilities,' 'AI input validation,' 'system prompt extraction,' 'agent security,' 'MCP security,' 'AI permissions,' 'AI privilege escalation,' or needs to secure any application with AI features, AI agents, or LLM integrations. | 68 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 2400590 | |
disk-forensics Analyze disk images and file systems for digital evidence recovery in forensic investigations and CTF challenges. Use when the user mentions 'disk forensics,' 'forensic analysis,' 'disk image,' 'file carving,' 'deleted files,' 'evidence recovery,' 'autopsy,' 'sleuthkit,' or needs to examine a forensic image. | 68 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 2400590 | |
incident-triage Guide rapid triage and initial response to security incidents following NIST SP 800-61 methodology. Use when the user mentions 'incident response,' 'security incident,' 'triage,' 'we've been hacked,' 'breach,' 'compromised,' 'malware detected,' 'suspicious activity,' 'IOC,' 'indicators of compromise,' or needs help handling a security event. | 68 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 2400590 | |
dependency-audit Audit project dependencies, frameworks, languages, and dev tools for known vulnerabilities, CVEs, and security anti-patterns. Use when the user mentions 'dependency audit,' 'npm audit,' 'CVE,' 'vulnerable packages,' 'supply chain security,' 'outdated dependencies,' 'known vulnerabilities,' 'security advisory,' 'package security,' 'framework vulnerability,' 'is this package safe,' or needs to check whether their stack has known security issues. | 65 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 2400590 | |
cloud-audit Audit cloud infrastructure (AWS, GCP, Azure) for misconfigurations, excessive permissions, and security gaps. Use when the user mentions 'cloud security,' 'cloud audit,' 'AWS security,' 'GCP security,' 'Azure security,' 'IAM audit,' 'S3 bucket,' 'cloud misconfiguration,' 'cloud hardening,' or needs to review cloud infrastructure security. | 68 Impact — No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 2400590 |