- 📁 assets/
- 📁 references/
- 📄 SKILL.md
Apply architectural guardrails when building software. Runs an intake questionnaire to determine the project's tier, then enforces security, reliability, and best practice rules appropriate to the tier while writing code.
Use when the user asks for a bug audit of a project or component
Backend specialist — builds APIs, database operations, auth, and server-side logic with security and performance focus
- 📁 contract-dev/
- 📁 txe/
- 📁 workspace/
- 📄 SKILL.md
Aztec smart contract development, Noir programming, testing, deployment, and TypeScript integration. Use when working with Aztec contracts, notes, private state, or any Aztec SDK code. Use review-contract for security reviews.
- 📁 .github/
- 📁 examples/
- 📁 Formula/
- 📄 .dockerignore
- 📄 .gitignore
- 📄 2026-03-31-README.md
Security scanner for AI Agent skills, plugins, and MCP servers. Use when: user asks to scan a skill, check if a plugin is safe, vet an MCP server, review skill security, detect malicious code, supply chain safety, or says 'is this safe to install', 'scan this skill', 'check this MCP server', 'security scan', 'vetting', 'skill safety', 'prism scan', '安全扫描', '这个插件安全吗', '扫描一下', '检查安全性', '安装前检查', '技能审查'.
- 📁 assets/
- 📁 evals/
- 📁 references/
- 📄 aeo-audit.skill
- 📄 SKILL.md
AEO (Answer Engine Optimization / AI Visibility) audit skill. Checks 4 categories: AI bot access (robots.txt, GPTBot, ClaudeBot), structured data (Schema.org/JSON-LD), content structure, and technical factors (HTTPS, sitemap, llms.txt). Scores 0-100 with ROI-ranked recommendations and generates a print-ready HTML/PDF report.
Run AEO audits, fix site issues, validate schema, generate llms.txt, and compare sites.
Complete bug bounty workflow — recon (subdomain enumeration, asset discovery, fingerprinting, HackerOne scope, source code audit), pre-hunt learning (disclosed reports, tech stack research, mind maps, threat modeling), vulnerability hunting (IDOR, SSRF, XSS, auth bypass, CSRF, race conditions, SQLi, XXE, file upload, business logic, GraphQL, HTTP smuggling, cache poisoning, OAuth, timing side-channels, OIDC, SSTI, subdomain takeover, cloud misconfig, ATO chains, agentic AI), LLM/AI security testing (chatbot IDOR, prompt injection, indirect injection, ASCII smuggling, exfil channels, RCE via code tools, system prompt extraction, ASI01-ASI10), A-to-B bug chaining (IDOR→auth bypass, SSRF→cloud metadata, XSS→ATO, open redirect→OAuth theft, S3→bundle→secret→OAuth), bypass tables (SSRF IP bypass, open redirect bypass, file upload bypass), language-specific grep (JS prototype pollution, Python pickle, PHP type juggling, Go template.HTML, Ruby YAML.load, Rust unwrap), and reporting (7-Question Gate, 4 validation gates, human-tone writing, templates by vuln class, CVSS 3.1, PoC generation, always-rejected list, conditional chain table, submission checklist). Use for ANY bug bounty task — starting a new target, doing recon, hunting specific vulns, auditing source code, testing AI features, validating findings, or writing reports.
Spawns an auditor sub-agent to verify every factual claim in an incident report against evidence in the repo. Use after drafting or substantially editing a report.
Build, deploy, and manage monday code apps with multi-region, cron, alerts, and security scanning. Use when user says "deploy my app", "push to monday-code", "deploy to monday", "check deployment status", "set environment variables", "push my app", "deploy backend", "deploy frontend", or wants to promote an app version.
Use when: creating, refactoring, auditing, upgrading, or debugging Copilot custom agents, skills, instructions, prompts, or hooks for Apple platform software engineering and agile delivery workflows.
Implement AI/ML security controls for prompt inspection, shadow AI discovery, and LLM data leakage prevention