- 📁 evals/
- 📁 references/
- 📁 scripts/
- 📄 checkpoints.yaml
- 📄 SKILL.md
Use when conducting security assessments, OWASP/CWE audits, CVSS scoring, auditing PHP/TYPO3 projects for vulnerabilities, scanning dependencies, or reviewing code for security concerns.
WCAG 2.1 Level AA compliance patterns for semantic HTML, ARIA, keyboard navigation, and screen reader compatibility. Use for accessibility audits, ARIA reviews, and POUR principle validation.
- 📁 references/
- 📁 scripts/
- 📄 .gitignore
- 📄 README.md
- 📄 SKILL.md
This skill should be used when the user asks to install or audit an MCP server, especially from third-party sources. Security-focused: clones at pinned commits, runs security scans.
- 📁 profiles/
- 📁 references/
- 📁 scripts/
- 📄 SKILL.md
Apply Harness Engineering to make modules AI-maintainable. Use when creating new modules, retrofitting existing modules, validating module compliance, or keeping a module handoff-ready across sessions.
Use when the user asks for a bug audit of a project or component
- 📄 .gitignore
- 📄 bun.lock
- 📄 commands.ts
Persistent browser daemon for live web testing, UI verification, and authenticated flows. Use when Claude needs to interact with a running web app — staging, localhost, or production.
- 📁 assets/
- 📁 references/
- 📁 scripts/
- 📄 .gitattributes
- 📄 .gitignore
- 📄 CONTRIBUTING.md
Comprehensive Android APK security audit with static analysis, dynamic instrumentation, source-to-sink tracing, IPC/component abuse analysis, and CVSS 4.0 reporting. Covers decompilation, manifest analysis, deep links and intent injection, secrets detection, crypto analysis, Frida/Objection integration, and APK repackaging. Use when user says "audit APK", "analyze android app", "mobile pentest", "APK security", "decompile APK", "android vulnerability assessment", "reverse engineer android", "modify APK", "intent injection", "deep link abuse", "bypass SSL pinning", "bypass root detection", or provides an APK for security review, decompiled Android sources, or decoded resources.
Backend specialist — builds APIs, database operations, auth, and server-side logic with security and performance focus
Test for authentication and authorization flaws including credential attacks, session issues, and access control bypasses
Requires UAT for Feishu MCP. In bot chat: `/mw4auth` or `飞书授权` (card); or `orbit feishu authorize`; or FEISHU_MCP_UAT / channels.feishu.mcp_user_access_token. Bot app_secret is not sufficient.
axe-core - accessibility testing engine for automated WCAG compliance checks.
- 📁 scripts/
- 📄 .clawhubignore
- 📄 .gitignore
- 📄 README.md
Manage multiple OpenAI Codex accounts. Capture current login tokens, switch between them, and auto-select the best account based on quota budget scoring. Syncs all tokens to OpenClaw agent auth-profiles using email-based keys. ⚠️ Reads and writes ~/.codex/auth.json, ~/.codex/accounts/*.json, and ~/.openclaw/agents/*/agent/auth-profiles.json (sensitive authentication tokens).