Explore

Find agent skills by outcome

65,355 skills indexed with the new KISS metadata standard.

Showing 24 of 65,355Categories: Data & Insights, Data, General, Research & Learning, Cursor-rules, Communication, Coding & Debugging, Creative
General
PromptBeginner5 minmarkdown

bleach

cryptography)

0
Coding & Debugging
PromptBeginner5 minmarkdown

- Use Python 3.10+ features where appropriate (match-case

typing)

0
General
PromptBeginner5 minmarkdown

- 🔑 Auth & Access Control (e.g.

missing MFA

0
General
PromptBeginner5 minmarkdown

- 📋 Compliance (e.g.

GDPR

0
General
PromptBeginner5 minmarkdown

- Add necessary secure imports (e.g.

secrets

0
General
PromptBeginner5 minmarkdown

- 🏗️ Infrastructure (e.g.

HTTPS enforcement

0
Coding & Debugging
PromptBeginner5 minmarkdown

- 🔐 Secrets Management (e.g.

hardcoded API keys

0
General
PromptBeginner5 minmarkdown

- 📦 Dependency Risk (e.g.

outdated or vulnerable libraries)

0
General
PromptBeginner5 minmarkdown

- ⚪ [Informational] — Best practice violation

no direct exploit

0
General
PromptBeginner5 minmarkdown

For each vulnerability

also provide a dedicated block:

0
General
PromptBeginner5 minmarkdown

- OWASP Mapping : e.g.

A03:2021 - Injection

0
General
PromptBeginner5 minmarkdown

- 🔴 [Critical] — Immediate exploitation risk

severe damage potential

0
General
PromptBeginner5 minmarkdown

- 🟠 [High] — Serious risk

exploitable with moderate effort

0
General
PromptBeginner5 minmarkdown

- 🔵 [Low] — Minor risk

limited impact

0
Coding & Debugging
PromptBeginner5 minmarkdown

- 🔌 External Interactions: DB calls

API calls

0
General
PromptBeginner5 minmarkdown

- 🎯 Audit Focus Areas: Based on the above

where security risk is most likely to appear

0
Data
PromptBeginner5 minmarkdown

- 💾 Data Handling: How data is received

validated

0
Coding & Debugging
PromptBeginner5 minmarkdown

Before auditing

confirm your understanding of the code:

0
General
PromptBeginner5 minmarkdown

- 🔗 Entry Points: Identified inputs

endpoints

0
General
PromptBeginner5 minmarkdown

in application security

OWASP Top 10

0
General
PromptBeginner5 minmarkdown

cambio de ojos

Anime boy with short white hair, pale skin, black shirt, close-up portrait, neutral expression, soft shadows, minimalist background, glowing demon red eyes, dark red sclera veins, subtle red aura arou...

0
Coding & Debugging
PromptBeginner5 minmarkdown

Python Security Vulnerability Auditor (OWASP-Mapped & Production-Hardened)

You are a senior Python security engineer and ethical hacker with deep expertise

0
Data
PromptBeginner5 minmarkdown

Post-Processing Validation: Provide assertion checks to verify data integrity (e.g.

checking for nulls or memory optimization via down casting).

0
Coding & Debugging
PromptBeginner5 minmarkdown

The Implementation Block: Write a modular

PEP8-compliant Python script using pandas and scikit-learn. Include a Pipeline object so the code is ready for a Streamlit dashboard or an automated batch job.

0