Browse the most recently seen skills in the imported catalog, with a stable tiebreak on current popularity.
trailofbits/skills
Guides through Trail of Bits' secure development workflow - a 5-step process to enhance smart contract security throughout development.
trailofbits/skills
Source provenance, compatibility, automated checks, and current evidence depth are available on the full page.
trailofbits/skills
Systematically scan Solana programs (native and Anchor framework) for platform-specific security vulnerabilities related to cross-program invocations, account validation, and program-derived addresses. This skill encodes 6 critical vulnerability patterns unique to Solana's account model.
trailofbits/skills
Systematically analyzes the codebase for token-related security concerns using Trail of Bits' token integration checklist:
trailofbits/skills
Source provenance, compatibility, automated checks, and current evidence depth are available on the full page.
onmax/nuxt-skills
Patterns for authoring high-quality TypeScript libraries, extracted from studying unocss, shiki, unplugin, vite, vitest, vueuse, zod, trpc, drizzle-orm, and more.
sickn33/antigravity-awesome-skills
Source provenance, compatibility, automated checks, and current evidence depth are available on the full page.
trailofbits/skills
Source provenance, compatibility, automated checks, and current evidence depth are available on the full page.
onmax/nuxt-skills
Writing guidance for blog posts and documentation following patterns from official Nuxt websites.
sickn33/antigravity-awesome-skills
Source provenance, compatibility, automated checks, and current evidence depth are available on the full page.
trailofbits/skills
Codebases often contain anti-fuzzing patterns that prevent effective coverage. Checksums, global state (like time-seeded PRNGs), and validation checks can block the fuzzer from exploring deeper code paths. This technique shows how to patch your System Under Test (SUT) to bypass these obstacles during fuzzing while...
trailofbits/skills
Systematically identify all state-changing entry points in a smart contract codebase to guide security audits.
trailofbits/skills
Helps prepare for a security review using Trail of Bits' checklist. A well-prepared codebase makes the review process smoother and more effective.
waynesutton/convexskills
Stop building features nobody needs. This skill helps you ship products that solve real problems without drowning in unnecessary complexity.
sickn33/antigravity-awesome-skills
You're a developer who has shipped dozens of Firebase projects. You've seen the "easy" path lead to security breaches, runaway costs, and impossible migrations. You know Firebase is powerful, but you also know its sharp edges.
sickn33/antigravity-awesome-skills
Complete toolkit for senior fullstack with modern tools and best practices.
trailofbits/skills
Coverage analysis is essential for understanding which parts of your code are exercised during fuzzing. It helps identify fuzzing blockers like magic value checks and tracks the effectiveness of harness improvements over time.
trailofbits/skills
Systematically assesses codebase maturity using Trail of Bits' 9-category framework. Provides evidence-based ratings and actionable recommendations.
onmax/nuxt-skills
Guide for creating Nuxt modules that extend framework functionality.
sickn33/antigravity-awesome-skills
Source provenance, compatibility, automated checks, and current evidence depth are available on the full page.
trailofbits/skills
Create production-quality Semgrep rules with proper testing and validation.
onmax/nuxt-skills
Progressive guidance for content-driven Nuxt apps with typed collections and SQL-backed queries.
trailofbits/skills
cargo-fuzz is the de facto choice for fuzzing Rust projects when using Cargo. It uses libFuzzer as the backend and provides a convenient Cargo subcommand that automatically enables relevant compilation flags for your Rust project, including support for sanitizers like AddressSanitizer.
trailofbits/skills
A fuzzing harness is the entrypoint function that receives random data from the fuzzer and routes it to your system under test (SUT). The quality of your harness directly determines which code paths get exercised and whether critical bugs are found. A poorly written harness can miss entire subsystems or produce...