
from awesome-skills-cn50
A structured workflow for testing REST and GraphQL API security: discovery, auth/authorization checks, input validation, rate limiting, GraphQL depth/complexity
Provides a phased workflow to audit and test API security for REST and GraphQL endpoints. Covers discovery/enumeration, authentication and authorization checks, input validation and injection tests, rate-limiting checks, GraphQL-specific tests, and error-handling review. Includes checklists and suggested skill invocations for fuzzing and scanning.
Use this skill when performing security assessments, bug-bounty style testing, pre-release security validation, or penetration testing focused on API endpoints. Suitable for security engineers, QA teams, and automated security pipelines.
Best used with agents that can orchestrate security tools and plugins (scanners, fuzzers) such as Claude/Copilot-style assistants or automation agents that can call external security tools.
This skill has not been reviewed by our automated audit pipeline yet.
Bash Pro
Defensive, production-grade Bash scripting patterns and CI/CD best practices: strict mode, safe argument parsing, testing with Bats, and tooling (ShellCheck/shf
Ip2location IO Automation
Automates Ip2location IO workflows through Rube MCP: discover tools, manage connections, and execute schema-compliant operations.
Makepad Event/Action
Event and action handling patterns for Makepad widgets — guides handling Mouse/Touch/Keyboard events, Hit detection, action emission and parent capture.
Obsidian CLI (vault & plugin ops)
Command-line reference and usage patterns for the Obsidian CLI: read/create/append notes, search vaults, manage properties, and developer workflows for plugin r
Kickbox Automation (Rube MCP)
Automate Kickbox toolkit operations through Rube MCP (Composio): discover tools, manage connections, and execute schema-compliant Kickbox workflows safely.
TaskEither Quick Reference (fp-ts)
Concise cheat-sheet for fp-ts TaskEither: patterns for typed async error handling, composing Promises, and recoverable pipelines.
Memory Forensics
Guidance and practical commands for acquiring, analyzing, and extracting artifacts from volatile memory dumps for incident response and malware analysis.