Bundle
Security Scanning
Four pre-merge security skills for OWASP Top 10 scanning, hardcoded secret detection, dependency CVE auditing, and STRIDE threat modeling — the first line against the highest-frequency real-world vulnerability classes.
Savings Callout
$44 bundle price vs. $79.96 as singles.
Formula pricing keeps every bundle at roughly 45% off the included single-skill prices.
Bundle License
$44
$79.96
Includes every listed skill with support for Claude Code, Codex, and OpenClaw, with the full individual price shown crossed out so the bundle discount is explicit.
All sales final. No refunds on digital products.
What You Get In This Bundle
Four pre-merge security skills for OWASP Top 10 scanning, hardcoded secret detection, dependency CVE auditing, and STRIDE threat modeling — the first line against the highest-frequency real-world vulnerability classes.
All ClearPoint Nexus Skills Include
- Production-ready workflow packaging for three supported platforms.
- Reusable structure designed for repeatable operator tasks.
- Clear deliverable format, not just raw prompt output.
Upgrade Path
If you later decide to move from bundles into Pro, bundle buyers get $33 off the first year of Pro automatically at checkout.
Included Skills
OWASP Top 10 Scanner
$19.99Scans code for OWASP Top 10 vulnerability patterns including injection, XSS, IDOR, and insecure deserialization with severity ratings and remediation snippets. Useful for pre-commit security checks and enterprise compliance.
Secret Leakage Preventer
$19.99Scans code and commits for hardcoded secrets, API keys, connection strings, and credentials, then proposes secure alternatives. Useful for preventing the leading class of AI-era security incidents.
Dependency CVE Auditor
$19.99Audits project dependencies against NVD and GitHub Advisory Database, producing a CVE report ranked by CVSS score with patch guidance. Useful for catching known vulnerabilities before they reach production.
Threat Model Generator
$19.99Generates a STRIDE threat model from a system architecture, identifying trust boundaries, per-component threats, and a prioritized risk register with mitigations. Useful for shifting threat modeling left in the development cycle.