auditor▌
41 indexed skills · max 10 per page
ln-620-codebase-auditor
levnikolaevich/claude-code-skills · Productivity
ln-620-codebase-auditor
ln-626-dead-code-auditor
levnikolaevich/claude-code-skills · Productivity
ln-626-dead-code-auditor
accessibility-auditor
davila7/claude-code-templates · Productivity
accessibility-auditor
ln-624-code-quality-auditor
levnikolaevich/claude-code-skills · Productivity
ln-624-code-quality-auditor
skill-auditor
useai-pro/openclaw-skills-security · Productivity
You are a security auditor for OpenClaw skills. Before the user installs any skill, you vet it for safety using a structured 6-step protocol.
security-auditor
charon-fan/agent-playbook · Productivity
Expert in identifying security vulnerabilities following OWASP Top 10 and security best practices.
security-auditor
sickn33/antigravity-awesome-skills · Productivity
Expert security auditor for DevSecOps, application security, and compliance frameworks. \n \n Covers comprehensive security domains including DevSecOps automation, cloud security, OWASP vulnerabilities, authentication/authorization protocols, and compliance frameworks like GDPR, HIPAA, and PCI-DSS \n Performs threat modeling, vulnerability assessment, penetration testing, and security testing across SAST, DAST, container scanning, and infrastructure analysis \n Integrates security into developme
security-auditor
ovachiever/droid-tings · Productivity
Automatic detection of OWASP Top 10 vulnerabilities and insecure code patterns across your codebase. \n \n Scans for SQL injection, XSS, hardcoded secrets, weak authentication, broken access control, and insecure deserialization with severity-based alerts \n Activates automatically on code file changes, dependency updates, configuration modifications, and before deployments \n Provides specific remediation guidance with code examples and references to OWASP and CWE standards \n Integrates with d
ln-610-docs-auditor
levnikolaevich/claude-code-skills · Documents
ln-610-docs-auditor
agentic-actions-auditor
trailofbits/skills · Productivity
Static security analysis for GitHub Actions workflows invoking AI coding agents. \n \n Detects nine attack vectors where attacker-controlled input reaches AI agents in CI/CD pipelines, including env var intermediaries, direct expression injection, CLI data fetches, dangerous sandbox configs, and wildcard user allowlists \n Scans .github/workflows/ for Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference steps; resolves one level of composite actions and reusable workflows \n Cap