4. Security & Compliance
Found 3608 skills
assisting-with-soc2-audit-preparation
jeremylongshore
Automates SOC2 audit preparation through evidence gathering, compliance gap identification, and remediation suggestions.
assisting-with-soc2-audit-preparation
jeremylongshore
Automates SOC2 audit preparation by gathering evidence, identifying compliance gaps, and suggesting remediation steps.
hardcoded-credential-finder
jeremylongshore
Detects and manages hardcoded credentials in code to prevent security breaches and ensure compliance with security standards.
scanning-database-security
jeremylongshore
Automates database security scanning and vulnerability detection, providing guidance for implementing security controls and conducting audits.
klingai-audit-logging
jeremylongshore
Provides comprehensive audit logging for Kling AI operations to track API usage, ensure compliance, and support security audits.
iam-policy-reviewer
jeremylongshore
Reviews IAM policies to identify security misconfigurations and ensure compliance with security standards.
encryption-at-rest-checker
jeremylongshore
Validates encryption at rest configurations to ensure security compliance and data protection.
network-security-scanner
jeremylongshore
Auto-activating network security scanner for identifying vulnerabilities and potential threats in network systems.
cursor-privacy-settings
jeremylongshore
Manages privacy and data handling configurations for the Cursor code editor, including telemetry and security options.
audit-trail-helper
jeremylongshore
Automates audit trail generation and management to ensure security accountability and regulatory compliance in enterprise workflows.
checking-owasp-compliance
jeremylongshore
Conducts security audits against OWASP Top 10 risks and best practices to validate web application security compliance.
scanning-input-validation-practices
jeremylongshore
Automatically scans source code for input validation flaws like SQL injection and XSS to prevent security exploits during code reviews and audits.
scanning-for-vulnerabilities
jeremylongshore
Scans code, dependencies, and configurations for security vulnerabilities and CVEs using static and dependency analysis.
vulnerability-report-generator
jeremylongshore
Creates comprehensive vulnerability reports with risk assessment and remediation guidance for security teams.
klingai-content-policy
jeremylongshore
Enforces Kling AI content policy compliance by filtering inappropriate prompts and ensuring generated content adheres to safety guidelines.
finding-security-misconfigurations
jeremylongshore
Audits infrastructure-as-code, application configurations, and system settings for security misconfigurations to ensure compliance with best practices.
vercel-security-basics
jeremylongshore
Applies Vercel security best practices for secrets management, access control, and configuration auditing to enhance platform security.
security-benchmark-runner
jeremylongshore
Manages security benchmark runner operations for compliance and security assessments within the Security Advanced suite.
validating-pci-dss-compliance
jeremylongshore
Assesses codebases and infrastructure for PCI DSS compliance, identifying vulnerabilities and deviations from security standards.
security-policy-generator
jeremylongshore
Automates security policy generation for compliance and enforcement. Activates for Security Advanced operations using trigger phrases.
governance-checklist-generator
jeremylongshore
Generates compliance-focused governance checklists for enterprise workflows, ensuring adherence to regulatory standards.
env-secret-detector
jeremylongshore
Detects and alerts on exposed environment secrets in code repositories to prevent security breaches.
clerk-enterprise-rbac
jeremylongshore
Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for secure user access and permissions.
insecure-deserialization-checker
jeremylongshore
Automatically identifies insecure deserialization risks in application code to prevent exploitation.