Agent skills
Skills you can use with AI coding agents, indexed from public GitHub repositories.
-
valgrind
Valgrind skill for the ikigai project
mgreenly/ikigai 1
-
zero-debt
Zero Technical Debt skill for the ikigai project
mgreenly/ikigai 1
-
coverage
Coverage policy - 90% requirement and exclusion rules
mgreenly/ikigai 1
-
debugger
Debugging strategy and constraints for ikigai
mgreenly/ikigai 1
-
sanitizers
Sanitizers skill for the ikigai project
mgreenly/ikigai 1
-
align
Align skill for the ikigai project
mgreenly/ikigai 1
-
docs
User documentation authoring guidelines for ikigai
mgreenly/ikigai 1
-
ikigai-ctl
Control socket client for programmatic interaction with running ikigai
mgreenly/ikigai 1
-
mocking
Mocking skill for the ikigai project
mgreenly/ikigai 1
-
database
Database skill for the ikigai project
mgreenly/ikigai 1
-
principles
Guiding principles and decision-making patterns for the ikigai project
mgreenly/ikigai 1
-
ctags
Use ctags for code navigation
mgreenly/ikigai 1
-
file-uploads
Expert at handling file uploads and cloud storage. Covers S3, Cloudflare R2, presigned URLs, multipart uploads, and image optimization. Knows how to handle large files without blocking. Use when: file upload, S3, R2, presigned URL, multipart.
davila7/claude-code-templates 23,776
-
vulnerability-scanner
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
davila7/claude-code-templates 23,776
-
Active Directory Attacks
This skill should be used when the user asks to "attack Active Directory", "exploit AD", "Kerberoasting", "DCSync", "pass-the-hash", "BloodHound enumeration", "Golden Ticket", "Silver Ticket", "AS-REP roasting", "NTLM relay", or needs guidance on Windows domain penetration testing.
davila7/claude-code-templates 23,776
-
Cloud Penetration Testing
This skill should be used when the user asks to "perform cloud penetration testing", "assess Azure or AWS or GCP security", "enumerate cloud resources", "exploit cloud misconfigurations", "test O365 security", "extract secrets from cloud environments", or "audit cloud infrastructure". It provides comprehensive techniques for security assessment across major cloud platforms.
davila7/claude-code-templates 23,776
-
SQL Injection Testing
This skill should be used when the user asks to "test for SQL injection vulnerabilities", "perform SQLi attacks", "bypass authentication using SQL injection", "extract database information through injection", "detect SQL injection flaws", or "exploit database query vulnerabilities". It provides comprehensive techniques for identifying, exploiting, and understanding SQL injection attack vectors across different database systems.
davila7/claude-code-templates 23,776
-
HTML Injection Testing
This skill should be used when the user asks to "test for HTML injection", "inject HTML into web pages", "perform HTML injection attacks", "deface web applications", or "test content injection vulnerabilities". It provides comprehensive HTML injection attack techniques and testing methodologies.
davila7/claude-code-templates 23,776
-
File Path Traversal Testing
This skill should be used when the user asks to "test for directory traversal", "exploit path traversal vulnerabilities", "read arbitrary files through web applications", "find LFI vulnerabilities", or "access files outside web root". It provides comprehensive file path traversal attack and testing methodologies.
davila7/claude-code-templates 23,776
-
Pentest Checklist
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.
davila7/claude-code-templates 23,776
-
security-threat-model
Repository-grounded threat modeling that enumerates trust boundaries, assets, attacker capabilities, abuse paths, and mitigations, and writes a concise Markdown threat model. Trigger only when the user explicitly asks to threat model a codebase or path, enumerate threats/abuse paths, or perform AppSec threat modeling. Do not trigger for general architecture summaries, code review, or non-security design work.
davila7/claude-code-templates 23,776
-
webapp-testing
Toolkit for interacting with and testing local web applications using Playwright. Supports verifying frontend functionality, debugging UI behavior, capturing browser screenshots, and viewing browser logs.
davila7/claude-code-templates 23,776
-
Windows Privilege Escalation
This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations," or "perform post-exploitation privilege escalation." It provides comprehensive guidance for discovering and exploiting privilege escalation vulnerabilities in Windows environments.
davila7/claude-code-templates 23,776
-
IDOR Vulnerability Testing
This skill should be used when the user asks to "test for insecure direct object references," "find IDOR vulnerabilities," "exploit broken access control," "enumerate user IDs or object references," or "bypass authorization to access other users' data." It provides comprehensive guidance for detecting, exploiting, and remediating IDOR vulnerabilities in web applications.
davila7/claude-code-templates 23,776