4. Security & Compliance
Found 3608 skills
cursor-compliance-audit
jeremylongshore
Performs security and compliance audits for Cursor, focusing on SOC2 and GDPR standards. Triggered by specific audit-related phrases.
scanning-for-vulnerabilities
jeremylongshore
Performs comprehensive security vulnerability scanning on code, dependencies, and configurations, including CVE detection via static and dependency analysis.
rate-limiter-config
jeremylongshore
Configures rate limiting parameters to prevent abuse and ensure system stability under high traffic loads.
webhook-signature-validator
jeremylongshore
Validates cryptographic signatures of incoming webhooks to ensure authenticity and prevent tampering in API integrations.
groq-enterprise-rbac
jeremylongshore
Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for Groq platforms.
juicebox-data-handling
jeremylongshore
Enables GDPR-compliant handling of personal and candidate data, ensuring privacy and regulatory adherence in data management processes.
http-header-security-audit
jeremylongshore
Conducts security audits of HTTP headers to identify vulnerabilities and enforce secure configurations.
lindy-security-basics
jeremylongshore
Provides security best practices for Lindy AI integrations, including API key management, permission configuration, and security controls implementation.
checking-owasp-compliance
jeremylongshore
Automatically scans code for OWASP Top 10 vulnerabilities, identifies compliance gaps, and provides remediation guidance for security audits.
secret-scanner
jeremylongshore
Automatically detects and alerts on exposed secrets in code repositories, preventing accidental credential leaks.
checking-hipaa-compliance
jeremylongshore
Automatically scans codebases, infrastructure, and documentation for HIPAA compliance issues, focusing on data privacy, security, and access controls.
input-validation-checker
jeremylongshore
Validates input validation mechanisms to prevent security vulnerabilities and ensure compliance.
deepgram-data-handling
jeremylongshore
Manages audio data storage, retention policies, and GDPR/HIPAA compliance for Deepgram transcription integrations.
siem-rule-generator
jeremylongshore
Generates SIEM rules for security monitoring. Auto-activating tool for Security Advanced, triggered by 'siem rule generator' or similar phrases.
gdpr-compliance-scanner
jeremylongshore
Automates GDPR compliance scanning to verify adherence to data protection regulations.
firecrawl-enterprise-rbac
jeremylongshore
Configures enterprise SSO, RBAC, and organization management for FireCrawl access control.
fuzzing-apis
jeremylongshore
Automates API fuzz testing to identify security vulnerabilities including SQL injection, XSS, and input validation flaws through malformed inputs and boundary testing.
fireflies-data-handling
jeremylongshore
Manages PII handling, data retention, and GDPR/CCPA compliance for Fireflies.ai integrations, ensuring privacy regulation adherence.
soc2-compliance-checker
jeremylongshore
Automatically validates SOC2 compliance operations for Security Advanced features. Triggered by SOC2-related phrases.
linear-enterprise-rbac
jeremylongshore
Configures enterprise RBAC and SSO for Linear, enabling secure team permissions and integration access management.
session-security-checker
jeremylongshore
Validates session security operations to ensure compliance with security fundamentals. Automatically activates for session security checks.
cursor-sso-integration
jeremylongshore
Configures SSO and enterprise authentication for Cursor, supporting SAML, OAuth, and Okta integrations.
finding-security-misconfigurations
jeremylongshore
Identifies security misconfigurations in infrastructure-as-code and application settings, highlighting vulnerabilities and compliance gaps.
validating-authentication-implementations
jeremylongshore
Validates authentication implementations against security best practices, covering JWT, OAuth, session-based auth, and API keys.