LogoAgentFend
  • Contact
Sign inProtect my Agent
AgentFendAgentFend

AgentFend intercepts prompt injections, data exfiltration, and malicious dependencies before they reach your agents.

Product

  • Library
  • Analyze a Skill
  • CLI

Resources

  • Status
  • Docs
  • Contact

Legal

  • Terms of Service
  • Privacy Policy
  • Legal Notice

© 2026 AgentFend

All rights reserved.

Curated security catalog

Skills Library

Discover and verify AI Skills.

1825 Matching skills
1825 Verified skills
17 Tracked categories
Tags

Results: 1825

Page 2 of 203

market-sizing-analysis

Verified
Testing

Calculate TAM/SAM/SOM for market opportunities using top-down, bottom-up, and value theory methodologies. Use this skill when sizing markets, estimating addressable revenue, validating market opportunity for a new venture, or building investor-ready market analysis for a startup pitch or business plan.

Compatible
AI
Mar 31, 2026
Score hidden until sign up

rag-implementation

Verified
Memory

Build Retrieval-Augmented Generation (RAG) systems for LLM applications with vector databases and semantic search. Use when implementing knowledge-grounded AI, building document Q&A systems, or integrating LLMs with external knowledge bases.

Compatible
Mar 31, 2026
Score hidden until sign up

competitive-landscape

Verified
Integrations

Analyze competition, identify differentiation opportunities, and develop winning market positioning strategies using Porter's Five Forces, Blue Ocean Strategy, and positioning maps. Use this skill when evaluating competitors, assessing market positioning, identifying sustainable competitive advantages, or preparing competitive strategy analysis for a startup or investor pitch.

Compatible
AI
Mar 31, 2026
Score hidden until sign up

skill-creator

Verified
Documents

Create new skills, modify and improve existing skills, and measure skill performance. Use when users want to create a skill from scratch, edit, or optimize an existing skill, run evals to test a skill, benchmark skill performance with variance analysis, or optimize a skill's description for better triggering accuracy.

Compatible
Mar 31, 2026
Score hidden until sign up

threat-mitigation-mapping

Verified
DevOps

Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.

Compatible
AI
Mar 31, 2026
Score hidden until sign up

security-requirement-extraction

Verified
Security

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

Compatible
AI
Mar 31, 2026
Score hidden until sign up

nextjs-app-router-patterns

Verified
Web Engineering

Master Next.js 14+ App Router with Server Components, streaming, parallel routes, and advanced data fetching. Use when building Next.js applications, implementing SSR/SSG, or optimizing React Server Components.

Compatible
AI
Mar 31, 2026
Score hidden until sign up

sast-configuration

Verified
DevOps

Configure Static Application Security Testing (SAST) tools for automated vulnerability detection in application code. Use when setting up security scanning, implementing DevSecOps practices, or automating code vulnerability detection.

Compatible
AI
Mar 31, 2026
Score hidden until sign up

attack-tree-construction

Verified
Backend

Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.

Compatible
AI
Mar 31, 2026
Score hidden until sign up
Previous
1
2
3
...203
Next