Agent skills
Skills you can use with AI coding agents, indexed from public GitHub repositories.
-
prompt-hacking
Advanced prompt manipulation including direct attacks, indirect injection, and multi-turn exploitation
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
adversarial-training
Defensive techniques using adversarial examples to improve model robustness and security
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
benchmark-datasets
Standard datasets and benchmarks for evaluating AI security, robustness, and safety
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
automated-testing
CI/CD integration and automation frameworks for continuous AI security testing
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
red-team-frameworks
Tools and frameworks for AI red teaming including PyRIT, garak, Counterfit, and custom attack automation
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
defense-implementation
Implement mitigations, create input filters, design output guards, and build defensive prompting for LLM security
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
rag-exploitation
Attack techniques for Retrieval-Augmented Generation systems including knowledge base poisoning
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
secure-deployment
Security best practices for deploying AI/ML models to production environments
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
llm-jailbreaking
Advanced LLM jailbreaking techniques, safety mechanism bypass strategies, and constraint circumvention methods
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
input-output-guardrails
Implementing safety filters, content moderation, and guardrails for AI system inputs and outputs
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
infrastructure-security
Securing AI/ML infrastructure including model storage, API endpoints, and compute resources
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
code-injection
Test AI systems for code injection vulnerabilities including prompt-to-code attacks and agent exploitation
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
vulnerability-discovery
Systematic vulnerability finding, threat modeling, and attack surface analysis for AI/LLM security assessments
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
certifications-training
Professional certifications, CTF competitions, and training resources for AI security practitioners
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
data-poisoning
Test AI training pipelines for data poisoning vulnerabilities and backdoor injection
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
continuous-monitoring
Real-time monitoring and detection of adversarial attacks and model drift in production
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
safety-filter-bypass
Techniques to test and bypass AI safety filters, content moderation systems, and guardrails for security assessment
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
testing-methodologies
Structured approaches for AI security testing including threat modeling, penetration testing, and red team operations
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
adversarial-examples
Generate adversarial inputs, edge cases, and boundary test payloads for stress-testing LLM robustness
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
prompt-injection-testing
Master prompt injection attacks, jailbreak techniques, input manipulation, and payload crafting for LLM security testing
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
security-testing
Comprehensive security testing automation for AI/ML systems with CI/CD integration
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
model-extraction
Techniques to extract model weights, architecture, and training data through API queries
pluginagentmarketplace/custom-plugin-ai-red-teaming 2
-
brainstorming
You MUST use this before any creative work - creating features, building components, adding functionality, or modifying behavior. Explores user intent, requirements and design before implementation.
galangryandana/superpowers-for-my-own-workflow 20
-
test-driven-development
Use when implementing any feature or bugfix, before writing implementation code
galangryandana/superpowers-for-my-own-workflow 20