senior-securitySecurity engineering toolkit for threat modeling, vulnerability analysis, secure architecture, and penetration testing. Includes STRIDE analysis, OWASP guida...
Install via ClawdBot CLI:
clawdbot install alirezarezvani/senior-securityGrade Good — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Generated Mar 1, 2026
A fintech company needs to assess a new mobile banking app for security vulnerabilities before launch. The Senior Security skill guides through threat modeling using STRIDE to identify risks like spoofing and tampering, followed by vulnerability assessment with SAST/DAST tools to ensure compliance with PCI-DSS and protect sensitive financial data.
A healthcare provider is designing a cloud-based patient portal to store electronic health records. Using the skill, they apply defense-in-depth layers and Zero Trust principles to secure data flows, implement encryption strategies for HIPAA compliance, and configure authentication with MFA to prevent unauthorized access to confidential information.
An online retailer wants to test their e-commerce website for vulnerabilities during a major sale event. The skill facilitates penetration testing workflows, including automated scanning for OWASP Top 10 issues like injection flaws, manual testing for business logic errors, and incident response planning to mitigate denial-of-service attacks.
A manufacturing firm develops IoT sensors for industrial monitoring and requires a security audit. The skill helps conduct threat modeling on data flows between devices and servers, assess vulnerabilities in firmware using static analysis, and design secure architecture with mTLS for service-to-service communication to prevent tampering.
A software-as-a-service startup is building a multi-tenant application and needs to ensure secure coding practices. The skill guides through secure code review workflows, identifying common vulnerabilities like information disclosure, implementing cryptography patterns for data encryption, and using secret scanning to prevent credential leaks in the codebase.
Offer specialized security assessments and architecture design for clients in regulated industries like finance or healthcare. Use the skill's workflows for threat modeling and vulnerability assessments to deliver detailed reports, helping clients meet compliance standards and reduce risk, with revenue generated from project-based fees or retainer contracts.
Provide ongoing security monitoring and penetration testing as a subscription service. Leverage the skill's tools for automated scanning and incident response to offer continuous protection, attracting small to medium businesses that lack in-house expertise, with revenue from monthly or annual subscriptions.
Develop and sell training courses or workshops based on the skill's methodologies, such as STRIDE analysis and secure architecture design. Target IT professionals and developers seeking to upskill, generating revenue through course fees, certification exams, and corporate training packages.
💬 Integration Tip
Integrate this skill into CI/CD pipelines for automated security scanning and use it alongside existing monitoring tools like SIEMs to enhance threat detection and response capabilities.
Scored Apr 15, 2026
Scan networks to discover devices, gather MAC addresses, vendors, and hostnames. Includes safety checks to prevent accidental scanning of public networks.
Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.
Reverse engineer binaries, APIs, protocols, and workflows with evidence ladders, interface maps, and falsifiable hypotheses.
Automatically generate professional CTF writeups from solving sessions with flag detection, challenge categorization, and proper markdown formatting