webflow-cost-tuning
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →webflow-cost-tuning
webflow-debug-bundle
webflow-deploy-integration
webflow-local-dev-loop
webflow-migration-deep-dive
webflow-performance-tuning
webflow-prod-checklist
webflow-upgrade-migration
windsurf-advanced-troubleshooting
windsurf-ci-integration
windsurf-core-workflow-a
windsurf-cost-tuning
windsurf-debug-bundle
windsurf-deploy-integration
windsurf-incident-runbook
windsurf-load-scale
windsurf-local-dev-loop
windsurf-migration-deep-dive
windsurf-performance-tuning
windsurf-policy-guardrails
windsurf-rate-limits
windsurf-reference-architecture
windsurf-upgrade-migration
windsurf-webhooks-events
wispr-debug-bundle
wispr-hello-world
wispr-performance-tuning
wispr-upgrade-migration
workhuman-debug-bundle
workhuman-performance-tuning
workhuman-upgrade-migration
Audit access control implementations for security vulnerabilities and misconfigurations. Use when reviewing authentication and authorization. Trigger with 'audit access control', 'check permissions', or 'validate authorization'.
Validate authentication mechanisms for security weaknesses and compliance. Use when reviewing login systems or auth flows. Trigger with 'validate authentication', 'check auth security', or 'review login'.
Generate comprehensive compliance reports for security standards. Use when creating compliance documentation. Trigger with 'generate compliance report', 'compliance status', or 'audit compliance'.
Validate CORS policies for security issues and misconfigurations. Use when reviewing cross-origin resource sharing. Trigger with 'validate CORS', 'check CORS policy', or 'review cross-origin'.
Validate CSRF protection implementations for security gaps. Use when reviewing form security or state-changing operations. Trigger with 'validate CSRF', 'check CSRF protection', or 'review token security'.
Scan for data privacy issues and sensitive information exposure. Use when reviewing data handling practices. Trigger with 'scan privacy issues', 'check sensitive data', or 'validate data protection'.
Analyze dependencies for known security vulnerabilities and outdated versions. Use when auditing third-party libraries. Trigger with 'check dependencies', 'scan for vulnerabilities', or 'audit packages'.
Validate encryption implementations and cryptographic practices. Use when reviewing data security measures. Trigger with 'check encryption', 'validate crypto', or 'review security keys'.
Scan for input validation vulnerabilities and injection risks. Use when reviewing user input handling. Trigger with 'scan input validation', 'check injection vulnerabilities', or 'validate sanitization'.
performing-penetration-testing
analyzing-security-headers
finding-security-misconfigurations
prompt-improver
detecting-sql-injection-vulnerabilities
scanning-for-xss-vulnerabilities
calendar-to-workflow
file-to-code
research-to-deploy
search-to-slack