4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

perplexity-security-basics

jeremylongshore

1.0K

Applies Perplexity security best practices for managing secrets, access control, and API key security through least privilege implementation.

Perplexity
Secrets Management
Least Privilege
4. Security & Compliance

scanning-for-vulnerabilities

jeremylongshore

1.0K

Performs comprehensive vulnerability scanning to detect security issues in code, dependencies, and configurations, including CVE identification.

Vulnerability Scanning
CVE
Dependency Scanning
4. Security & Compliance

threat-model-creator

jeremylongshore

1.0K

Automates the creation of security threat models to identify and mitigate potential system vulnerabilities.

Threat Modeling
Security Assessment
4. Security & Compliance

code-injection-detector

jeremylongshore

1.0K

Identifies potential code injection vulnerabilities in input or code snippets to prevent security breaches.

Code Injection
Vulnerability Detection
4. Security & Compliance

performing-security-code-review

jeremylongshore

1.0K

Conducts security-focused code reviews to identify vulnerabilities such as SQL injection, XSS, and insecure dependencies, providing severity ratings and remediation guidance.

SQL Injection
XSS
Insecure Dependencies
4. Security & Compliance

apollo-enterprise-rbac

jeremylongshore

1.0K

Enables enterprise role-based access control (RBAC) for Apollo.io, managing team permissions and data access restrictions.

RBAC
Apollo.io
Enterprise Security
4. Security & Compliance

validating-authentication-implementations

jeremylongshore

1.0K

Validates authentication mechanisms for security weaknesses and compliance in login systems and auth flows.

Authentication
Security Audit
Compliance
4. Security & Compliance

replit-security-basics

jeremylongshore

1.0K

Applies Replit security best practices for managing secrets, implementing least privilege access, and auditing security configurations.

Replit
Secrets Management
Access Control
4. Security & Compliance

instantly-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise SSO, role-based access control, and organization management for Instantly platform.

SSO
RBAC
SAML
4. Security & Compliance

cookie-security-analyzer

jeremylongshore

1.0K

Identifies security risks in web cookie configurations, ensuring compliance with best practices and mitigating potential vulnerabilities.

HTTP Cookies
Security Audit
Vulnerability Detection
4. Security & Compliance

attack-surface-analyzer

jeremylongshore

1.0K

Analyzes system attack surfaces to identify vulnerabilities and security risks in real-time for proactive defense.

Attack Surface
Vulnerability Assessment
Security Analysis
4. Security & Compliance

generating-security-audit-reports

jeremylongshore

1.0K

Generates comprehensive security audit reports with vulnerability insights, compliance status, and remediation recommendations for systems and applications.

Security Audit
Vulnerability Assessment
Compliance
4. Security & Compliance

soc2-compliance-checker

jeremylongshore

1.0K

Automates SOC2 compliance checks for security assessments, ensuring adherence to regulatory standards through auto-activation.

SOC2
Compliance
Security
4. Security & Compliance

detecting-sql-injection-vulnerabilities

jeremylongshore

1.0K

Scans application code and database queries for SQL injection vulnerabilities, ensuring secure query patterns and input sanitization.

SQL Injection
Code Auditing
Input Sanitization
4. Security & Compliance

generating-compliance-reports

jeremylongshore

1.0K

Automates generation of compliance reports for security standards including PCI DSS, HIPAA, and SOC 2.

PCI DSS
HIPAA
SOC 2
4. Security & Compliance

apollo-data-handling

jeremylongshore

1.0K

Provides GDPR-compliant management of Apollo.io contact data, including exports, retention, and PII handling.

GDPR
PII
Data Retention
4. Security & Compliance

scanning-for-data-privacy-issues

jeremylongshore

1.0K

Scans code and configuration files for data privacy vulnerabilities, identifying PII exposure and GDPR compliance issues.

PII
GDPR
Code Scanning
4. Security & Compliance

generating-compliance-reports

jeremylongshore

1.0K

Automates compliance report generation for security standards including PCI DSS, HIPAA, and SOC 2 to ensure regulatory adherence.

PCI DSS
HIPAA
SOC 2
4. Security & Compliance

validating-cors-policies

jeremylongshore

1.0K

Validates CORS configurations to identify security vulnerabilities and prevent unauthorized cross-origin requests, ensuring data protection.

CORS
Security Audit
Policy Validation
4. Security & Compliance

checking-owasp-compliance

jeremylongshore

1.0K

Automates OWASP Top 10 vulnerability scanning and compliance gap analysis for application security audits.

OWASP Top 10
Security Audit
Vulnerability Scanning
4. Security & Compliance

firewall-rule-generator

jeremylongshore

1.0K

Automates GCP firewall rule creation for secure cloud network configurations.

GCP
Firewall Rules
Cloud Security
4. Security & Compliance

responding-to-security-incidents

jeremylongshore

1.0K

Guides security teams through incident response, investigation, and remediation for breaches, ransomware, and data incidents.

Incident Response
Forensics
Remediation
4. Security & Compliance

checking-session-security

jeremylongshore

1.0K

Audits web application session management for security flaws including session fixation, timeout misconfigurations, and insecure ID generation.

Session Fixation
Session Timeout
Session ID Security
4. Security & Compliance

scanning-api-security

jeremylongshore

1.0K

Scans APIs for security vulnerabilities including injection, broken authentication, and data exposure.

API Security
Vulnerability Scanning
Broken Authentication
4. Security & Compliance
PreviousPage 12 of 151 PageNext