AAWEA.ORG
AAWEA.ORG
AAWEA.ORG
AAWEA AI Skills Hub · One-Click AI Workflows

Your AI Toolkit.
Ready to Use.

🧩
What is an AI Skill?
A Skill is a pre-built AI workflow — you just fill in your details and get a professional output in seconds. No coding, no setup, no AI expertise needed.
1424+
AI Skills
75
Categories
1-Click
To Use
Free
To Try

How It Works — 3 Steps

🔍
1
Find a Skill
Browse by category or search for what you need. Each skill shows exactly what it produces.
✏️
2
Fill in Your Details
Answer a few simple questions about your business, goal, or topic. No tech knowledge needed.
3
Get Your Result
Receive a professional AI-generated output — copy it, download it, or use it directly in your work.

security Skills

← All Skills
Vulnerability Scanner 🤖
Vulnerability Scanner
Community
security

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

Wireshark Analysis 🤖
Wireshark Analysis
Community
security

Execute comprehensive network traffic analysis using Wireshark to capture, filter, and examine network packets for security investigations, performance optimization, and troubleshooting.

Zeroize Audit 🤖
Zeroize Audit
Community
security

Detects missing zeroization of sensitive data in source code and identifies zeroization removed by compiler optimizations, with assembly-level analysis, and control-flow verification. Use for auditing C/C++/Rust code handling secrets, keys, passwords, or other sensitive data.

Security Requirement Extraction 🤖
Security Requirement Extraction
Community
security

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

Audit Skills 🤖
Audit Skills
Community
security

Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).

Aws Compliance Checker 🤖
Aws Compliance Checker
Community
security

Automated compliance checking against CIS, PCI-DSS, HIPAA, and SOC 2 benchmarks

Aws Iam Best Practices 🤖
Aws Iam Best Practices
Community
security

IAM policy review, hardening, and least privilege implementation

Aws Secrets Rotation 🤖
Aws Secrets Rotation
Community
security

Automate AWS secrets rotation for RDS, API keys, and credentials

Aws Security Audit 🤖
Aws Security Audit
Community
security

Comprehensive AWS security posture assessment using AWS CLI and security best practices

Ffuf Claude Skill 🤖
Ffuf Claude Skill
Community
security

Web fuzzing with ffuf

Gdpr Data Handling 🤖
Gdpr Data Handling
Community
security

Practical implementation guide for GDPR-compliant data processing, consent management, and privacy controls.

Gha Security Review 🤖
Gha Security Review
Community
security

Find exploitable vulnerabilities in GitHub Actions workflows. Every finding MUST include a concrete exploitation scenario — if you can't build the attack, don't report it.

Laravel Security Audit 🤖
Laravel Security Audit
Community
security

Security auditor for Laravel applications. Analyzes code for vulnerabilities, misconfigurations, and insecure practices using OWASP standards and Laravel security best practices.

Privacy By Design 🤖
Privacy By Design
Community
security

Use when building apps that collect user data. Ensures privacy protections are built in from the start—data minimization, consent, encryption.

Protocol Reverse Engineering 🤖
Protocol Reverse Engineering
Community
security

Comprehensive techniques for capturing, analyzing, and documenting network protocols for security research, interoperability, and debugging.

Security Compliance Compliance Check 🤖
Security Compliance Compliance Check
Community
security

You are a compliance expert specializing in regulatory requirements for software systems including GDPR, HIPAA, SOC2, PCI-DSS, and other industry standards. Perform comprehensive compliance audits and provide implementation guidance for achieving and maintaining compliance.

File Uploads 🤖
File Uploads
Community
security

Expert at handling file uploads and cloud storage. Covers S3, Cloudflare R2, presigned URLs, multipart uploads, and image optimization. Knows how to handle large files without blocking.

Security Scanning Security Dependencies 🤖
Security Scanning Security Dependencies
Community
security

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across multiple ecosystems to identify vulnerabilities, assess risks, and provide automated remediation strategies.

Skill Audit 🤖
Skill Audit
Community
security

Pre-install security scanner for AI agent skills. 7.5% of 14,706 skills are malicious. Audit before you trust.

Solidity Security 🤖
Solidity Security
Community
security

Master smart contract security best practices, vulnerability prevention, and secure Solidity development patterns.

Stride Analysis Patterns 🤖
Stride Analysis Patterns
Community
security

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

Threat Mitigation Mapping 🤖
Threat Mitigation Mapping
Community
security

Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.

Varlock Claude Skill 🤖
Varlock Claude Skill
Community
security

Secure environment variable management ensuring secrets are never exposed in Claude sessions, terminals, logs, or git commits

007 🤖
007
Community
security

Security audit, hardening, threat modeling (STRIDE/PASTA), Red/Blue Team, OWASP checks, code review, incident response, and infrastructure security for any project.

🤖

Not sure where to start?

Tell us your goal and our AI will recommend the perfect skill for you — no browsing required.
🎯 Find My Perfect Skill →