debug
A lightweight alternative to Clawdbot / OpenClaw that runs in containers for security. Connects to WhatsApp, has memory, scheduled jobs, and runs directly on Anthropic's Agents SDK
Browse and install thousands of AI Agent skills in the Killer-Skills directory. Supports Claude Code, Windsurf, Cursor, and more.
A lightweight alternative to Clawdbot / OpenClaw that runs in containers for security. Connects to WhatsApp, has memory, scheduled jobs, and runs directly on Anthropic's Agents SDK
skill-scanner is a security analysis tool for AI agent skills, identifying potential threats and vulnerabilities to ensure secure skill adoption.
A lightweight alternative to OpenClaw that runs in containers for security. Connects to WhatsApp, Telegram, Slack and other messaging apps,, has memory, scheduled jobs, and runs directly on Anthropic's Agents SDK
A curated list of Web3 Security materials and resources for Pentesters and Bug Hunters.
Security checks for the Ralph Loop - scan before commit, fix iteratively, escalate when stuck
Find bugs, security vulnerabilities, and code quality issues in local branch changes. Use when asked to review changes, find bugs, security review, or audit code on the current branch.
Production-ready Claude Code configuration template with stack presets, security hooks, and automation tools
A total of 300+ skills for software development, security and Cloud architecture. Agnostic on development language and cloud of choice.
Interactive TUI to orchestrate AI agents. Give it a PRD, get back architecture, test plan, security assessment, and working code.
Comprehensive Cloudflare platform skill covering Workers, Pages, storage (KV, D1, R2), AI (Workers AI, Vectorize, Agents SDK), networking (Tunnel, Spectrum), security (WAF, DDoS), and infrastructure-as-code (Terraform, Pulumi). Use for any Cloudflare development task. Biases towards retrieval from Cloudflare docs over pre-trained knowledge.
Distributed adversarial behavioral security evaluation framework for LLMs - Swarm-based parallel probing with cryptographic consensus
Security code review for vulnerabilities. Use when asked to security review, find vulnerabilities, check for security issues, audit security, OWASP review, or review code for injection, XSS, authentication, authorization, cryptography issues. Provides systematic review with confidence-based reporting.