4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

assisting-with-soc2-audit-preparation

jeremylongshore

1.0K

Automates SOC2 audit preparation through evidence gathering, compliance gap identification, and remediation suggestions.

SOC2
Compliance
Audit
4. Security & Compliance

assisting-with-soc2-audit-preparation

jeremylongshore

1.0K

Automates SOC2 audit preparation by gathering evidence, identifying compliance gaps, and suggesting remediation steps.

SOC2
Compliance Gap
Audit Automation
4. Security & Compliance

hardcoded-credential-finder

jeremylongshore

1.0K

Detects and manages hardcoded credentials in code to prevent security breaches and ensure compliance with security standards.

Hardcoded Credentials
Code Auditing
Security Scanning
4. Security & Compliance

scanning-database-security

jeremylongshore

1.0K

Automates database security scanning and vulnerability detection, providing guidance for implementing security controls and conducting audits.

Vulnerability Scanning
Security Audit
Database Security
4. Security & Compliance

klingai-audit-logging

jeremylongshore

1.0K

Provides comprehensive audit logging for Kling AI operations to track API usage, ensure compliance, and support security audits.

Audit Logging
Compliance
Security Audits
4. Security & Compliance

iam-policy-reviewer

jeremylongshore

1.0K

Reviews IAM policies to identify security misconfigurations and ensure compliance with security standards.

IAM
Policy Review
Security Auditing
4. Security & Compliance

encryption-at-rest-checker

jeremylongshore

1.0K

Validates encryption at rest configurations to ensure security compliance and data protection.

encryption at rest
security compliance
data protection
4. Security & Compliance

network-security-scanner

jeremylongshore

1.0K

Auto-activating network security scanner for identifying vulnerabilities and potential threats in network systems.

Network Scanning
Vulnerability Assessment
4. Security & Compliance

cursor-privacy-settings

jeremylongshore

1.0K

Manages privacy and data handling configurations for the Cursor code editor, including telemetry and security options.

Cursor
Privacy Settings
Telemetry
4. Security & Compliance

audit-trail-helper

jeremylongshore

1.0K

Automates audit trail generation and management to ensure security accountability and regulatory compliance in enterprise workflows.

Audit Trail
Compliance
Security Monitoring
4. Security & Compliance

checking-owasp-compliance

jeremylongshore

1.0K

Conducts security audits against OWASP Top 10 risks and best practices to validate web application security compliance.

OWASP Top 10
Security Audit
Compliance
4. Security & Compliance

scanning-input-validation-practices

jeremylongshore

1.0K

Automatically scans source code for input validation flaws like SQL injection and XSS to prevent security exploits during code reviews and audits.

Input Validation
SQL Injection
XSS
4. Security & Compliance

scanning-for-vulnerabilities

jeremylongshore

1.0K

Scans code, dependencies, and configurations for security vulnerabilities and CVEs using static and dependency analysis.

CVE
Static Analysis
Dependency Scanning
4. Security & Compliance

vulnerability-report-generator

jeremylongshore

1.0K

Creates comprehensive vulnerability reports with risk assessment and remediation guidance for security teams.

Vulnerability Report
Security Assessment
Risk Assessment
4. Security & Compliance

klingai-content-policy

jeremylongshore

1.0K

Enforces Kling AI content policy compliance by filtering inappropriate prompts and ensuring generated content adheres to safety guidelines.

Content Moderation
AI Safety
Policy Compliance
4. Security & Compliance

finding-security-misconfigurations

jeremylongshore

1.0K

Audits infrastructure-as-code, application configurations, and system settings for security misconfigurations to ensure compliance with best practices.

Terraform
CloudFormation
Security Misconfiguration
4. Security & Compliance

vercel-security-basics

jeremylongshore

1.0K

Applies Vercel security best practices for secrets management, access control, and configuration auditing to enhance platform security.

Vercel
Secrets Management
Least Privilege
4. Security & Compliance

security-benchmark-runner

jeremylongshore

1.0K

Manages security benchmark runner operations for compliance and security assessments within the Security Advanced suite.

Security Benchmark
Compliance
Security Assessment
4. Security & Compliance

validating-pci-dss-compliance

jeremylongshore

1.0K

Assesses codebases and infrastructure for PCI DSS compliance, identifying vulnerabilities and deviations from security standards.

PCI DSS
Compliance Assessment
4. Security & Compliance

security-policy-generator

jeremylongshore

1.0K

Automates security policy generation for compliance and enforcement. Activates for Security Advanced operations using trigger phrases.

Security Policy
Compliance
Policy Generation
4. Security & Compliance

governance-checklist-generator

jeremylongshore

1.0K

Generates compliance-focused governance checklists for enterprise workflows, ensuring adherence to regulatory standards.

Governance
Compliance
Checklist
4. Security & Compliance

env-secret-detector

jeremylongshore

1.0K

Detects and alerts on exposed environment secrets in code repositories to prevent security breaches.

Environment Secrets
Secret Detection
4. Security & Compliance

clerk-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for secure user access and permissions.

SSO
RBAC
SAML
4. Security & Compliance

insecure-deserialization-checker

jeremylongshore

1.0K

Automatically identifies insecure deserialization risks in application code to prevent exploitation.

Insecure Deserialization
Security Audit
OWASP
4. Security & Compliance
PreviousPage 13 of 151 PageNext