4. Security & Compliance
Found 3608 skills
certificate-lifecycle-manager
jeremylongshore
Automates digital certificate lifecycle management including issuance, renewal, and revocation to ensure secure communications and compliance with security standards.
finding-security-misconfigurations
jeremylongshore
Identifies security misconfigurations in infrastructure-as-code, application settings, and system configurations to pinpoint vulnerabilities and compliance gaps.
coderabbit-security-basics
jeremylongshore
Applies CodeRabbit security best practices for secrets management and least privilege access control implementation.
gamma-security-basics
jeremylongshore
Provides security best practices for Gamma integration, including API key management, access controls, and security configuration auditing.
security-headers-generator
jeremylongshore
Automates generation of security headers to protect web applications and ensure compliance with security standards.
penetration-test-planner
jeremylongshore
Plans and orchestrates penetration testing operations for Security Advanced. Auto-activating tool triggered by phrases like 'penetration test planner'.
xss-vulnerability-scanner
jeremylongshore
Scans web applications for Cross-Site Scripting (XSS) vulnerabilities to identify security weaknesses.
groq-webhooks-events
jeremylongshore
Secures Groq webhook endpoints through signature verification and event processing to prevent spoofing and ensure integrity.
scanning-database-security
jeremylongshore
Performs OWASP-compliant database security scans for vulnerabilities like SQL injection and weak passwords, with remediation guidance for PostgreSQL and MySQL.
retellai-security-basics
jeremylongshore
Applies Retell AI security best practices for managing secrets and access control configurations to enhance security posture.
password-hash-generator
jeremylongshore
Generates secure password hashes for storage. Auto-activating security tool triggered by 'password hash generator' phrases.
windsurf-code-privacy
jeremylongshore
Configures code privacy and data retention policies to ensure GDPR compliance and data governance adherence. Triggered by privacy-related keywords.
validating-csrf-protection
jeremylongshore
Validates CSRF protection mechanisms including tokens, cookies, and SameSite attributes to identify vulnerabilities in web applications.
cors-policy-validator
jeremylongshore
Validates CORS policies to ensure secure cross-origin resource sharing configurations, preventing security vulnerabilities.
implementing-database-audit-logging
jeremylongshore
Guides database audit logging implementation for compliance, offering strategies like triggers, CDC, and schema generation to track data changes.
http-header-security-audit
jeremylongshore
Auto-activating HTTP header security audit to identify vulnerabilities and ensure compliance.
performing-security-code-review
jeremylongshore
Conducts automated security code reviews to identify vulnerabilities including SQL injection, XSS, and authentication flaws.
clay-data-handling
jeremylongshore
Enforces data privacy compliance for Clay integrations through PII handling, retention policies, and GDPR/CCPA adherence.
groq-security-basics
jeremylongshore
Secures Groq API keys and configurations using best practices for secrets management and least privilege access control.
sentry-security-basics
jeremylongshore
Configures Sentry security settings for data protection, including data scrubbing and sensitive data management policies.
checking-session-security
jeremylongshore
Analyzes codebase for session security vulnerabilities including insecure IDs, missing expiration, and session fixation risks.
clerk-data-handling
jeremylongshore
Handles user data operations including export, deletion, and GDPR compliance for Clerk-integrated applications.
checking-infrastructure-compliance
jeremylongshore
Automates infrastructure compliance checks, validates security policies, and provides audit guidance for regulatory adherence.
clay-security-basics
jeremylongshore
Applies Clay security best practices for managing secrets, implementing least privilege access, and auditing security configurations.