Database
Browse 5,303 skills across 372 packs and 37 categories
Database Security Hardening
323LDependency Supply Chain Security
362LError Handling and Information Leakage
391LInput Validation Patterns
329LLeast-Privilege Permissions
323LProduction Hardening Checklist
385LReal-Time Security Monitoring
385LSecure API Design
402LSecure File Handling
374LTrust Misconfiguration Audit
320LAccess Control Testing
141LAuthorization testing, privilege escalation, and IDOR detection for authorized security assessments
API Security Testing
163LAPI auth flows, rate limiting, schema validation, and GraphQL security testing for authorized assessments
Authentication Testing
145LAuthentication review, credential handling, and session management testing for authorized assessments
Business Logic Testing
166LBusiness logic flaw detection, race conditions, and workflow bypass testing for authorized assessments
Input Validation Testing
147LXSS, SQLi, command injection, and template injection testing for authorized security assessments
Web Configuration Review
156LSecurity headers, CORS, CSP, cookie flags, and TLS configuration review for authorized assessments
Bluetooth Security Review
142LBluetooth and BLE security assessment, pairing weakness analysis, sniffing, and device enumeration
Guest Network Security Assessment
136LGuest network isolation testing, captive portal bypass, and visitor network security assessment
Home and Small Business Network Security
140LHome and small business network security assessment, router posture, smart device review, and WFH security
IoT Device Exposure Assessment
137LIoT device exposure assessment, default credential testing, firmware review, and protocol analysis
Wi-Fi Security Assessment
134LWi-Fi security configuration review, WPA enterprise testing, rogue AP detection, and wireless attack surface analysis