4. Security & Compliance
Found 3608 skills
perplexity-security-basics
jeremylongshore
Applies Perplexity security best practices for managing secrets, access control, and API key security through least privilege implementation.
scanning-for-vulnerabilities
jeremylongshore
Performs comprehensive vulnerability scanning to detect security issues in code, dependencies, and configurations, including CVE identification.
threat-model-creator
jeremylongshore
Automates the creation of security threat models to identify and mitigate potential system vulnerabilities.
code-injection-detector
jeremylongshore
Identifies potential code injection vulnerabilities in input or code snippets to prevent security breaches.
performing-security-code-review
jeremylongshore
Conducts security-focused code reviews to identify vulnerabilities such as SQL injection, XSS, and insecure dependencies, providing severity ratings and remediation guidance.
apollo-enterprise-rbac
jeremylongshore
Enables enterprise role-based access control (RBAC) for Apollo.io, managing team permissions and data access restrictions.
validating-authentication-implementations
jeremylongshore
Validates authentication mechanisms for security weaknesses and compliance in login systems and auth flows.
replit-security-basics
jeremylongshore
Applies Replit security best practices for managing secrets, implementing least privilege access, and auditing security configurations.
instantly-enterprise-rbac
jeremylongshore
Configures enterprise SSO, role-based access control, and organization management for Instantly platform.
cookie-security-analyzer
jeremylongshore
Identifies security risks in web cookie configurations, ensuring compliance with best practices and mitigating potential vulnerabilities.
attack-surface-analyzer
jeremylongshore
Analyzes system attack surfaces to identify vulnerabilities and security risks in real-time for proactive defense.
generating-security-audit-reports
jeremylongshore
Generates comprehensive security audit reports with vulnerability insights, compliance status, and remediation recommendations for systems and applications.
soc2-compliance-checker
jeremylongshore
Automates SOC2 compliance checks for security assessments, ensuring adherence to regulatory standards through auto-activation.
detecting-sql-injection-vulnerabilities
jeremylongshore
Scans application code and database queries for SQL injection vulnerabilities, ensuring secure query patterns and input sanitization.
generating-compliance-reports
jeremylongshore
Automates generation of compliance reports for security standards including PCI DSS, HIPAA, and SOC 2.
apollo-data-handling
jeremylongshore
Provides GDPR-compliant management of Apollo.io contact data, including exports, retention, and PII handling.
scanning-for-data-privacy-issues
jeremylongshore
Scans code and configuration files for data privacy vulnerabilities, identifying PII exposure and GDPR compliance issues.
generating-compliance-reports
jeremylongshore
Automates compliance report generation for security standards including PCI DSS, HIPAA, and SOC 2 to ensure regulatory adherence.
validating-cors-policies
jeremylongshore
Validates CORS configurations to identify security vulnerabilities and prevent unauthorized cross-origin requests, ensuring data protection.
checking-owasp-compliance
jeremylongshore
Automates OWASP Top 10 vulnerability scanning and compliance gap analysis for application security audits.
firewall-rule-generator
jeremylongshore
Automates GCP firewall rule creation for secure cloud network configurations.
responding-to-security-incidents
jeremylongshore
Guides security teams through incident response, investigation, and remediation for breaches, ransomware, and data incidents.
checking-session-security
jeremylongshore
Audits web application session management for security flaws including session fixation, timeout misconfigurations, and insecure ID generation.
scanning-api-security
jeremylongshore
Scans APIs for security vulnerabilities including injection, broken authentication, and data exposure.