4. Security & Compliance
Found 3608 skills
performing-security-testing
jeremylongshore
Automates security vulnerability testing for OWASP Top 10, SQL injection, XSS, CSRF, and authentication flaws during security assessments.
csrf-protection-validator
jeremylongshore
Validates CSRF protection mechanisms in web applications to prevent cross-site request forgery attacks.
analyzing-dependencies
jeremylongshore
Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across npm, pip, composer, gem, and go modules.
fireflies-security-basics
jeremylongshore
Applies Fireflies.ai security best practices for secrets management and access control, including API key security and least privilege implementation.
scanning-database-security
jeremylongshore
Conducts database security scans to identify vulnerabilities like SQL injection and weak passwords, providing OWASP-compliant remediation suggestions.
plugin-auditor
jeremylongshore
Automates security vulnerability checks, best practices, and CLAUDE.md compliance audits for Claude Code plugins per repository standards.
fuzzing-apis
jeremylongshore
Performs automated fuzz testing on APIs to identify vulnerabilities such as SQL injection, XSS, and input validation failures through malformed inputs and boundary testing.
sentry-enterprise-rbac
jeremylongshore
Configures role-based access control (RBAC) for Sentry enterprise, managing team permissions and SSO integration for secure organizational access.
linear-security-basics
jeremylongshore
Provides secure API key management and OAuth best practices for Linear integrations, ensuring robust authentication and data protection.
scanning-for-xss-vulnerabilities
jeremylongshore
Automatically scans code for XSS vulnerabilities, identifying reflected, stored, and DOM-based flaws in HTML, JavaScript, and CSS contexts, and suggests safe proof-of-concept payloads.
integrating-secrets-managers
jeremylongshore
Enables seamless integration with secrets managers (e.g., HashiCorp Vault, AWS Secrets Manager) to generate secure configurations for sensitive credential management.
exa-data-handling
jeremylongshore
Handles Exa-specific PII data processing, retention policies, and ensures GDPR/CCPA compliance for data privacy in integrations.
scanning-for-accessibility-issues
jeremylongshore
Performs automated accessibility audits against WCAG 2.1/2.2 standards, validating ARIA, keyboard navigation, and screen reader compatibility for web applications.
api-key-manager
jeremylongshore
Automates secure API key management including storage, rotation, and access control to prevent unauthorized access and ensure compliance.
dependency-vulnerability-checker
jeremylongshore
Automatically scans project dependencies for known security vulnerabilities to enhance code security and compliance.
calculating-crypto-taxes
jeremylongshore
Automates cryptocurrency tax calculation, including cost basis methods, capital gains, and Form 8949 generation for regulatory compliance.
scanning-for-xss-vulnerabilities
jeremylongshore
Automatically scans code for XSS vulnerabilities, identifying reflected, stored, and DOM-based flaws with safe proof-of-concept suggestions.
scanning-for-accessibility-issues
jeremylongshore
Performs automated WCAG 2.1/2.2 compliance audits, validating ARIA, keyboard navigation, and screen reader compatibility.
session-security-checker
jeremylongshore
Automates session security checks to identify vulnerabilities in user sessions, enhancing security posture.
scanning-database-security
jeremylongshore
Conducts database security scans for vulnerabilities including SQL injection and weak passwords, providing OWASP-aligned remediation suggestions for PostgreSQL and MySQL.
cookie-security-analyzer
jeremylongshore
Analyzes web cookie security configurations to detect vulnerabilities and ensure secure implementation of HttpOnly, Secure, and SameSite attributes.
performing-security-audits
jeremylongshore
Conducts comprehensive security audits including vulnerability scanning, compliance checks, and infrastructure analysis to identify and mitigate security risks.
detecting-sql-injection-vulnerabilities
jeremylongshore
Detects SQL injection vulnerabilities in codebases and provides remediation guidance using a dedicated plugin.
implementing-database-audit-logging
jeremylongshore
Implements database audit logging to track changes for compliance and security monitoring via triggers, CDC, or native logs.