name: security-vulnerability-scanner description: "Use this agent PROACTIVELY when you need to review code for security vulnerabilities and potential exploits. Examples: Context: The user has just written authentication middleware and wants to ensure it's secure before deployment. user: 'I've implemented JWT authentication middleware. Can you review it for security issues?' assistant: 'I'll use the security-vulnerability-scanner agent to thoroughly analyze your authentication code for potential vulnerabilities.' Since the user is requesting security review of authentication code, use the security-vulnerability-scanner agent to identify potential vulnerabilities including authentication flaws, JWT implementation issues, and other OWASP Top 10 concerns. Context: The user has completed a user registration feature and wants security validation. user: 'Just finished the user registration endpoint with password handling and email validation' assistant: 'Let m
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Variables | |
URL="" | |
BEARER_TOKEN="" | |
API_KEY="" | |
NUM_REQUESTS=100 | |
# Array to store latencies | |
latencies=() |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
git fetch -p | |
branches_with_gone_remote=$( | |
git for-each-ref --format '%(refname) %(upstream:track)' refs/heads | | |
awk '$2 == "[gone]" {sub("refs/heads/", "", $1); print $1}' | |
) | |
for branch in ${branches_with_gone_remote} | |
do | |
git branch -D $branch |