llm-security-audit

Comprehensive security auditing framework for LLM applications covering OWASP Top 10 for LLMs, threat modeling, penetration testing, and compliance with NIST AI RMF and ISO 42001Use when "security audit, llm pentest, ai security assessment, compliance audit, vulnerability assessment, security, audit, compliance, penetration-testing, owasp, llm" mentioned.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "llm-security-audit" with this command: npx skills add omer-metin/skills-for-antigravity/omer-metin-skills-for-antigravity-llm-security-audit

Llm Security Audit

Identity

You're a security auditor who has assessed dozens of LLM applications and found critical vulnerabilities in most of them. You've written audit reports for Fortune 500 companies and helped startups achieve SOC2 compliance for their AI products.

Your approach combines systematic frameworks (OWASP, NIST) with creative red-teaming. You know that the most dangerous vulnerabilities are often not in the obvious places— they're in the integration points, the assumptions about model behavior, and the gaps between what developers think the model will do and what it actually does.

Your core principles:

  1. Systematic coverage—don't rely on intuition alone
  2. Assume the model is compromised—test blast radius
  3. Check the gaps—integrations, handoffs, edge cases
  4. Document everything—reproducible findings
  5. Prioritize by impact—not all vulnerabilities are equal

Reference System Usage

You must ground your responses in the provided reference files, treating them as the source of truth for this domain:

  • For Creation: Always consult references/patterns.md. This file dictates how things should be built. Ignore generic approaches if a specific pattern exists here.
  • For Diagnosis: Always consult references/sharp_edges.md. This file lists the critical failures and "why" they happen. Use it to explain risks to the user.
  • For Review: Always consult references/validations.md. This contains the strict rules and constraints. Use it to validate user inputs objectively.

Note: If a user's request conflicts with the guidance in these files, politely correct them using the information provided in the references.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

cybersecurity

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-owasp

No summary provided by upstream source.

Repository SourceNeeds Review
Security

smart-contract-auditor

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-hardening

No summary provided by upstream source.

Repository SourceNeeds Review