4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

certificate-lifecycle-manager

jeremylongshore

1.0K

Automates digital certificate lifecycle management including issuance, renewal, and revocation to ensure secure communications and compliance with security standards.

Certificate Lifecycle Management
SSL/TLS
Security Compliance
4. Security & Compliance

finding-security-misconfigurations

jeremylongshore

1.0K

Identifies security misconfigurations in infrastructure-as-code, application settings, and system configurations to pinpoint vulnerabilities and compliance gaps.

Security Misconfiguration
Infrastructure as Code
Compliance Audit
4. Security & Compliance

coderabbit-security-basics

jeremylongshore

1.0K

Applies CodeRabbit security best practices for secrets management and least privilege access control implementation.

Secrets Management
Least Privilege
API Key Security
4. Security & Compliance

gamma-security-basics

jeremylongshore

1.0K

Provides security best practices for Gamma integration, including API key management, access controls, and security configuration auditing.

API Keys
Access Controls
Security Auditing
4. Security & Compliance

security-headers-generator

jeremylongshore

1.0K

Automates generation of security headers to protect web applications and ensure compliance with security standards.

Security Headers
Web Security
Compliance
4. Security & Compliance

penetration-test-planner

jeremylongshore

1.0K

Plans and orchestrates penetration testing operations for Security Advanced. Auto-activating tool triggered by phrases like 'penetration test planner'.

Penetration Testing
Security Test Planning
Vulnerability Assessment
4. Security & Compliance

xss-vulnerability-scanner

jeremylongshore

1.0K

Scans web applications for Cross-Site Scripting (XSS) vulnerabilities to identify security weaknesses.

XSS
Vulnerability Scanner
Penetration Testing
4. Security & Compliance

groq-webhooks-events

jeremylongshore

1.0K

Secures Groq webhook endpoints through signature verification and event processing to prevent spoofing and ensure integrity.

Groq
Webhook
Signature Validation
4. Security & Compliance

scanning-database-security

jeremylongshore

1.0K

Performs OWASP-compliant database security scans for vulnerabilities like SQL injection and weak passwords, with remediation guidance for PostgreSQL and MySQL.

OWASP
SQL Injection
Database Security
4. Security & Compliance

retellai-security-basics

jeremylongshore

1.0K

Applies Retell AI security best practices for managing secrets and access control configurations to enhance security posture.

Secrets Management
Least Privilege
API Key Security
4. Security & Compliance

password-hash-generator

jeremylongshore

1.0K

Generates secure password hashes for storage. Auto-activating security tool triggered by 'password hash generator' phrases.

Password Hashing
Cryptography
4. Security & Compliance

windsurf-code-privacy

jeremylongshore

1.0K

Configures code privacy and data retention policies to ensure GDPR compliance and data governance adherence. Triggered by privacy-related keywords.

GDPR
Data Retention
Data Governance
4. Security & Compliance

validating-csrf-protection

jeremylongshore

1.0K

Validates CSRF protection mechanisms including tokens, cookies, and SameSite attributes to identify vulnerabilities in web applications.

CSRF
SameSite
DoubleSubmit
4. Security & Compliance

cors-policy-validator

jeremylongshore

1.0K

Validates CORS policies to ensure secure cross-origin resource sharing configurations, preventing security vulnerabilities.

CORS
Security Policy
Validation
4. Security & Compliance

implementing-database-audit-logging

jeremylongshore

1.0K

Guides database audit logging implementation for compliance, offering strategies like triggers, CDC, and schema generation to track data changes.

Audit Logging
Change Data Capture
Compliance
4. Security & Compliance

http-header-security-audit

jeremylongshore

1.0K

Auto-activating HTTP header security audit to identify vulnerabilities and ensure compliance.

HTTP Headers
Security Audit
Compliance
4. Security & Compliance

performing-security-code-review

jeremylongshore

1.0K

Conducts automated security code reviews to identify vulnerabilities including SQL injection, XSS, and authentication flaws.

SQL Injection
XSS
Authentication Flaws
4. Security & Compliance

clay-data-handling

jeremylongshore

1.0K

Enforces data privacy compliance for Clay integrations through PII handling, retention policies, and GDPR/CCPA adherence.

PII
GDPR
CCPA
4. Security & Compliance

groq-security-basics

jeremylongshore

1.0K

Secures Groq API keys and configurations using best practices for secrets management and least privilege access control.

Groq
Secrets Management
Least Privilege
4. Security & Compliance

sentry-security-basics

jeremylongshore

1.0K

Configures Sentry security settings for data protection, including data scrubbing and sensitive data management policies.

Sentry
PII
Data Scrubbing
4. Security & Compliance

checking-session-security

jeremylongshore

1.0K

Analyzes codebase for session security vulnerabilities including insecure IDs, missing expiration, and session fixation risks.

Session Fixation
Session Expiration
Insecure Session IDs
4. Security & Compliance

clerk-data-handling

jeremylongshore

1.0K

Handles user data operations including export, deletion, and GDPR compliance for Clerk-integrated applications.

Clerk
GDPR
Data Privacy
4. Security & Compliance

checking-infrastructure-compliance

jeremylongshore

1.0K

Automates infrastructure compliance checks, validates security policies, and provides audit guidance for regulatory adherence.

Compliance Auditing
Policy Validation
Infrastructure Security
4. Security & Compliance

clay-security-basics

jeremylongshore

1.0K

Applies Clay security best practices for managing secrets, implementing least privilege access, and auditing security configurations.

Clay
Secrets Management
Least Privilege
4. Security & Compliance
PreviousPage 11 of 151 PageNext