Current

Anthropic Cybersecurity Skills

A curated collection of 611+ structured cybersecurity skills compatible with Claude Code, GitHub Copilot, Cursor, and Gemini CLI, enabling AI coding assistants to perform security analysis, threat modeling, and vulnerability assessment tasks.

Signal

Anthropic Cybersecurity Skills · GitHub

Context

This repository provides a structured collection of cybersecurity skills — 611+ as of the signal date — formatted for use with AI coding assistants across multiple platforms: Claude Code, GitHub Copilot, Cursor, and Gemini CLI. Skills cover security analysis, threat modeling, vulnerability assessment, and related domains. The platform-agnostic approach (supporting four distinct AI assistant environments) reflects both the fragmentation of the current AI assistant market and an attempt to create reusable security expertise that travels across tools. Apache 2.0 license ensures permissive use and modification.

Relevance

The collection represents an emerging pattern: domain expertise encoded as machine-readable skills that extend AI assistant capabilities beyond general-purpose code generation into specialized professional domains. Cybersecurity is a particularly significant early domain because it is both high-stakes (errors have serious consequences) and skills-dependent (expertise is concentrated and difficult to distribute). If structured skills can reliably extend AI assistant capability in security contexts, the pattern will propagate rapidly to other expert domains.

Current State

492 stars on GitHub with active curation. 611+ skills covering the cybersecurity domain across multiple task types. Compatible with four major AI coding assistant platforms. Apache 2.0 license. Community contributions appear welcome given the open structure.

Open Questions

  • How are skill quality and accuracy validated — who reviews the cybersecurity expertise encoded in the 611+ entries?
  • How does performance compare across the four supported platforms — are skills designed for one assistant consistently effective in others?
  • What is the governance model for skills that could be used for both defensive (threat modeling, vulnerability assessment) and offensive (attack surface mapping, exploit research) purposes?
  • How does this structured skill approach compare to fine-tuning or RAG-based approaches for domain specialization?

Connections

This collection sits alongside skills.sh as an instance of the extensible skills pattern for AI agents, but applied to a security domain rather than general-purpose workflows. The dual-use nature of security skills connects it directly to Heretic — both operate in the space between defense and offense that defines security research. The inspectable agent operations circuit's concern for auditable AI behavior applies with particular urgency when the agent is performing security analysis: knowing what the agent did and why matters more in security contexts than in most others.

Updates

2026-03-22: The repository now lists 734+ structured cybersecurity skills (increased from 611+) and supports 20+ AI platforms including OpenAI Codex CLI, expanding beyond the previously listed four environments. It now also aligns with the agentskills.io open standard and includes MITRE ATT&CK mapping for its skill set.

Connections

  • skills.sh - comparable structured skills framework for AI agent capability extension (Current · en)
  • OpenClaw - skills-based agent extensibility pattern applied to security domain (Current · en)
  • Inspectable Agent Operations Circuit - security-focused skills raise auditability questions for AI-assisted analysis (Circuit · en)
  • Heretic - occupies the opposite end of the security spectrum — defense vs. dealignment (Current · en)

Linked from

External references

Mediation note

Tooling: human-drafted from GitHub signal

Use: researched from primary source

Human role: full authorship

Limits: verify skill coverage and platform compatibility against primary source before publishing