Marketplace

Find the right skill for the job.

Browse the full catalog through outcome-first channels, technical facets, rating filters, and server-side pagination built for a large public marketplace.

Start with the job to be done
1836 results
Run DevOps · All facets
Page 51 of 77
SkillHub ClubRun DevOps

pentest-http-smuggling

HTTP request smuggling, desync attacks, cache poisoning, and protocol-level vulnerability testing.

C 3.0
Full StackSecurityTesting
191
rank 67
hot 97
SkillHub ClubRun DevOps

seclens-enterprise-web

Professional web application and API security testing workflows using OWASP Top 10 methodologies.

C 3.0
Full StackBackendSecurity
191
rank 67
hot 97
SkillHub ClubRun DevOps

pentest-client-advanced

Advanced client-side attacks — CORS misconfiguration, WebSocket security, clickjacking, postMessage abuse, CSS injection, and browser storage vulnerabilities.

C 3.0
Full StackSecurity
191
rank 67
hot 97
SkillHub ClubRun DevOps

pentest-whitebox-code-review

Source code security audit using backward taint analysis, slot type classification, render context verification, and 3-phase parallel review producing an exploitation queue.

C 3.0
Full StackSecurityTesting
191
rank 67
hot 97
SkillHub ClubRun DevOps

reverse-engineering-firmware

This skill provides firmware extraction and security analysis for IoT devices and embedded systems, focusing on reverse engineering, vulnerability assessment, and compliance verification in isolated environments.

C 3.0
Full StackSecurityTesting
securityiotfirmwarereverse-engineering
23
rank 57
hot 88
SkillHub ClubRun DevOps

security-scan

This skill performs automated security vulnerability scanning for codebases, detecting issues like OWASP Top 10 risks, hardcoded secrets, and injection flaws to improve application security.

C 3.0
Full StackSecurity
securityvulnerabilitiessastowasp
35
rank 59
hot 90
SkillHub ClubRun DevOps

wake-word-detection

Expert skill for implementing wake word detection with openWakeWord. Covers audio monitoring, keyword spotting, privacy protection, and efficient always-listening systems for JARVIS voice assistant.

C 3.0
Full StackSecurity
28
rank 58
hot 89
SkillHub ClubRun DevOps

fastapi-expert

Expert FastAPI developer specializing in production-ready async REST APIs with Pydantic v2, SQLAlchemy 2.0, OAuth2/JWT authentication, and comprehensive security. Deep expertise in dependency injection, background tasks, async database operations, input validation, and OWASP security best practices. Use when building high-performance Python web APIs, implementing authentication systems, or securing API endpoints.

C 3.0
Full StackBackendSecurity
28
rank 58
hot 89
SkillHub ClubRun DevOps

azure-devops

Azure DevOps work items, repos, and pipelines

C 3.0
Full StackDevOps
17
rank 55
hot 87
SkillHub ClubRun DevOps

devops

Deploy and manage cloud infrastructure on Cloudflare (Workers, R2, D1, KV, Pages, Durable Objects, Browser Rendering), Docker containers, and Google Cloud Platform (Compute Engine, GKE, Cloud Run, App Engine, Cloud Storage). Use when deploying serverless functions to the edge, configuring edge computing solutions, managing Docker containers and images, setting up CI/CD pipelines, optimizing cloud infrastructure costs, implementing global caching strategies, working with cloud databases, or building cloud-native applications.

C 3.0
Full StackDevOps
0
rank 45
hot 74
SkillHub ClubRun DevOps

vercel-webhooks

Receive and verify Vercel webhooks. Use when setting up Vercel webhook handlers, debugging signature verification, or handling deployment events like deployment.created, deployment.succeeded, or project.created.

C 3.0
Full StackDevOpsTesting
63
rank 62
hot 92
SkillHub ClubRun DevOps

chargebee-webhooks

Receive and verify Chargebee webhooks. Use when setting up Chargebee webhook handlers, debugging Basic Auth verification, or handling subscription billing events.

C 3.0
Full StackSecurityTesting
63
rank 62
hot 92
SkillHub ClubRun DevOps

ansible-proxmox

This skill should be used when automating Proxmox VE with Ansible, creating VMs or templates, managing Proxmox clusters, using community.proxmox collection, or deciding between native modules and CLI commands (pvecm, pveceph, qm).

C 3.0
Full StackDevOps
ansibleproxmoxautomationinfrastructure
14
rank 54
hot 86
SkillHub ClubRun DevOps

iac-checkov

Infrastructure as Code (IaC) security scanning using Checkov with 750+ built-in policies for Terraform, CloudFormation, Kubernetes, Dockerfile, and ARM templates. Use when: (1) Scanning IaC files for security misconfigurations and compliance violations, (2) Validating cloud infrastructure against CIS, PCI-DSS, HIPAA, and SOC2 benchmarks, (3) Detecting secrets and hardcoded credentials in IaC, (4) Implementing policy-as-code in CI/CD pipelines, (5) Generating compliance reports with remediation guidance for cloud security posture management.

C 3.0
DevOpsSecurity
iaccheckovterraformkubernetes
77
rank 63
hot 93
SkillHub ClubRun DevOps

container-grype

Container vulnerability scanning and dependency risk assessment using Grype with CVSS severity ratings, EPSS exploit probability, and CISA KEV indicators. Use when: (1) Scanning container images and filesystems for known vulnerabilities, (2) Integrating vulnerability scanning into CI/CD pipelines with severity thresholds, (3) Analyzing SBOMs (Syft, SPDX, CycloneDX) for security risks, (4) Prioritizing remediation based on threat metrics (CVSS, EPSS, KEV), (5) Generating vulnerability reports in multiple formats (JSON, SARIF, CycloneDX) for security toolchain integration.

C 3.0
DevOpsSecurityIntegration
container-securityvulnerability-scanningscasbom
77
rank 63
hot 93
SkillHub ClubRun DevOps

forensics-osquery

SQL-powered forensic investigation and system interrogation using osquery to query operating systems as relational databases. Enables rapid evidence collection, threat hunting, and incident response across Linux, macOS, and Windows endpoints. Use when: (1) Investigating security incidents and collecting forensic artifacts, (2) Threat hunting across endpoints for suspicious activity, (3) Analyzing running processes, network connections, and persistence mechanisms, (4) Collecting system state during incident response, (5) Querying file hashes, user activity, and system configuration for compromise indicators, (6) Building detection queries for continuous monitoring with osqueryd.

C 3.0
Security
forensicsosqueryincident-responsethreat-hunting
77
rank 63
hot 93
SkillHub ClubRun DevOps

dast-nuclei

Fast, template-based vulnerability scanning using ProjectDiscovery's Nuclei with extensive community templates covering CVEs, OWASP Top 10, misconfigurations, and security issues across web applications, APIs, and infrastructure. Use when: (1) Performing rapid vulnerability scanning with automated CVE detection, (2) Testing for known vulnerabilities and security misconfigurations in web apps and APIs, (3) Running template-based security checks in CI/CD pipelines with customizable severity thresholds, (4) Creating custom security templates for organization-specific vulnerability patterns, (5) Scanning multiple targets efficiently with concurrent execution and rate limiting controls.

C 3.0
BackendDevOpsSecurity
dastnucleivulnerability-scanningcve
77
rank 63
hot 93
SkillHub ClubRun DevOps

sast-semgrep

Static application security testing (SAST) using Semgrep for vulnerability detection, security code review, and secure coding guidance with OWASP and CWE framework mapping. Use when: (1) Scanning code for security vulnerabilities across multiple languages, (2) Performing security code reviews with pattern-based detection, (3) Integrating SAST checks into CI/CD pipelines, (4) Providing remediation guidance with OWASP Top 10 and CWE mappings, (5) Creating custom security rules for organization-specific patterns, (6) Analyzing dependencies for known vulnerabilities.

C 3.0
DevOpsSecurityTesting
sastsemgrepvulnerability-scanningcode-security
77
rank 63
hot 93
SkillHub ClubRun DevOps

webapp-nikto

Web server vulnerability scanner for identifying security issues, misconfigurations, and outdated software versions. Use when: (1) Conducting authorized web server security assessments, (2) Identifying common web vulnerabilities and misconfigurations, (3) Detecting outdated server software and known vulnerabilities, (4) Performing compliance scans for web server hardening, (5) Enumerating web server information and enabled features, (6) Validating security controls and patch levels.

C 3.0
BackendSecurity
web-securityvulnerability-scannerniktoserver-security
77
rank 63
hot 93
SkillHub ClubRun DevOps

sast-horusec

Multi-language static application security testing using Horusec with support for 18+ programming languages and 20+ security analysis tools. Performs SAST scans, secret detection in git history, and provides vulnerability findings with severity classification. Use when: (1) Analyzing code for security vulnerabilities across multiple languages simultaneously, (2) Detecting exposed secrets and credentials in git history, (3) Integrating SAST into CI/CD pipelines for secure SDLC, (4) Performing comprehensive security analysis during development, (5) Managing false positives and prioritizing security findings.

C 3.0
DevOpsSecurityTesting
sasthorusecvulnerability-scanningmulti-language
77
rank 63
hot 93
SkillHub ClubRun DevOps

policy-opa

Policy-as-code enforcement and compliance validation using Open Policy Agent (OPA). Use when: (1) Enforcing security and compliance policies across infrastructure and applications, (2) Validating Kubernetes admission control policies, (3) Implementing policy-as-code for compliance frameworks (SOC2, PCI-DSS, GDPR, HIPAA), (4) Testing and evaluating OPA Rego policies, (5) Integrating policy checks into CI/CD pipelines, (6) Auditing configuration drift against organizational security standards, (7) Implementing least-privilege access controls.

C 3.0
DevOpsSecurityTesting
opapolicy-as-codecompliancerego
76
rank 63
hot 93
SkillHub ClubRun DevOps

ir-velociraptor

Endpoint visibility, digital forensics, and incident response using Velociraptor Query Language (VQL) for evidence collection and threat hunting at scale. Use when: (1) Conducting forensic investigations across multiple endpoints, (2) Hunting for indicators of compromise or suspicious activities, (3) Collecting endpoint telemetry and artifacts for incident analysis, (4) Performing live response and evidence preservation, (5) Monitoring endpoints for security events, (6) Creating custom forensic artifacts for specific threat scenarios.

C 3.0
Security
forensicsincident-responseendpoint-detectionthreat-hunting
76
rank 63
hot 93
SkillHub ClubRun DevOps

sca-trivy

Software Composition Analysis (SCA) and container vulnerability scanning using Aqua Trivy for identifying CVE vulnerabilities in dependencies, container images, IaC misconfigurations, and license compliance risks. Use when: (1) Scanning container images and filesystems for vulnerabilities and misconfigurations, (2) Analyzing dependencies for known CVEs across multiple languages (Go, Python, Node.js, Java, etc.), (3) Detecting IaC security issues in Terraform, Kubernetes, Dockerfile, (4) Integrating vulnerability scanning into CI/CD pipelines with SARIF output, (5) Generating Software Bill of Materials (SBOM) in CycloneDX or SPDX format, (6) Prioritizing remediation by CVSS score and exploitability.

C 3.0
DevOpsSecurity
scatrivycontainer-securityvulnerability-scanning
76
rank 63
hot 93
SkillHub ClubRun DevOps

api-authentication

API authentication patterns including JWT, OAuth 2.0, API keys, and session-based auth. Covers token generation, validation, refresh strategies, security best practices, and when to use each pattern. Use when implementing API authentication, choosing auth strategy, securing endpoints, or debugging auth issues. Prevents common vulnerabilities like token theft, replay attacks, and insecure storage.

C 3.0
Full StackBackendSecurity
45
rank 60
hot 91
Previous
Page 51 of 77
Next