4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

performing-security-testing

jeremylongshore

1.0K

Automates security vulnerability testing for OWASP Top 10, SQL injection, XSS, CSRF, and authentication flaws during security assessments.

OWASP Top 10
SQL Injection
XSS
4. Security & Compliance

csrf-protection-validator

jeremylongshore

1.0K

Validates CSRF protection mechanisms in web applications to prevent cross-site request forgery attacks.

CSRF
Web Security
CSRF Protection
4. Security & Compliance

analyzing-dependencies

jeremylongshore

1.0K

Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across npm, pip, composer, gem, and go modules.

Dependency Check
Vulnerability Scanning
License Compliance
4. Security & Compliance

fireflies-security-basics

jeremylongshore

1.0K

Applies Fireflies.ai security best practices for secrets management and access control, including API key security and least privilege implementation.

Fireflies.ai
Secrets Management
API Keys
4. Security & Compliance

scanning-database-security

jeremylongshore

1.0K

Conducts database security scans to identify vulnerabilities like SQL injection and weak passwords, providing OWASP-compliant remediation suggestions.

OWASP
SQL Injection
Database Scanning
4. Security & Compliance

plugin-auditor

jeremylongshore

1.0K

Automates security vulnerability checks, best practices, and CLAUDE.md compliance audits for Claude Code plugins per repository standards.

Security Auditing
CLAUDE.md
Code Compliance
4. Security & Compliance

fuzzing-apis

jeremylongshore

1.0K

Performs automated fuzz testing on APIs to identify vulnerabilities such as SQL injection, XSS, and input validation failures through malformed inputs and boundary testing.

Fuzz Testing
API Security
Vulnerability Scanning
4. Security & Compliance

sentry-enterprise-rbac

jeremylongshore

1.0K

Configures role-based access control (RBAC) for Sentry enterprise, managing team permissions and SSO integration for secure organizational access.

Sentry
RBAC
SSO
4. Security & Compliance

linear-security-basics

jeremylongshore

1.0K

Provides secure API key management and OAuth best practices for Linear integrations, ensuring robust authentication and data protection.

API Key Management
OAuth
Linear
4. Security & Compliance

scanning-for-xss-vulnerabilities

jeremylongshore

1.0K

Automatically scans code for XSS vulnerabilities, identifying reflected, stored, and DOM-based flaws in HTML, JavaScript, and CSS contexts, and suggests safe proof-of-concept payloads.

XSS
Vulnerability Scanning
Code Audit
4. Security & Compliance

integrating-secrets-managers

jeremylongshore

1.0K

Enables seamless integration with secrets managers (e.g., HashiCorp Vault, AWS Secrets Manager) to generate secure configurations for sensitive credential management.

HashiCorp Vault
AWS Secrets Manager
Secure Configuration
4. Security & Compliance

exa-data-handling

jeremylongshore

1.0K

Handles Exa-specific PII data processing, retention policies, and ensures GDPR/CCPA compliance for data privacy in integrations.

PII
GDPR
CCPA
4. Security & Compliance

scanning-for-accessibility-issues

jeremylongshore

1.0K

Performs automated accessibility audits against WCAG 2.1/2.2 standards, validating ARIA, keyboard navigation, and screen reader compatibility for web applications.

WCAG
ARIA
Screen Reader
4. Security & Compliance

api-key-manager

jeremylongshore

1.0K

Automates secure API key management including storage, rotation, and access control to prevent unauthorized access and ensure compliance.

API Key Management
Key Rotation
Access Control
4. Security & Compliance

dependency-vulnerability-checker

jeremylongshore

1.0K

Automatically scans project dependencies for known security vulnerabilities to enhance code security and compliance.

Dependency Scanning
Vulnerability Assessment
Code Auditing
4. Security & Compliance

calculating-crypto-taxes

jeremylongshore

1.0K

Automates cryptocurrency tax calculation, including cost basis methods, capital gains, and Form 8949 generation for regulatory compliance.

Form 8949
Cost Basis
Capital Gains
4. Security & Compliance

scanning-for-xss-vulnerabilities

jeremylongshore

1.0K

Automatically scans code for XSS vulnerabilities, identifying reflected, stored, and DOM-based flaws with safe proof-of-concept suggestions.

XSS
Security Scanning
Code Auditing
4. Security & Compliance

scanning-for-accessibility-issues

jeremylongshore

1.0K

Performs automated WCAG 2.1/2.2 compliance audits, validating ARIA, keyboard navigation, and screen reader compatibility.

WCAG
ARIA
Screen Reader
4. Security & Compliance

session-security-checker

jeremylongshore

1.0K

Automates session security checks to identify vulnerabilities in user sessions, enhancing security posture.

Session Security
Vulnerability Scanning
Security Assessment
4. Security & Compliance

scanning-database-security

jeremylongshore

1.0K

Conducts database security scans for vulnerabilities including SQL injection and weak passwords, providing OWASP-aligned remediation suggestions for PostgreSQL and MySQL.

OWASP
SQL Injection
Vulnerability Assessment
4. Security & Compliance

cookie-security-analyzer

jeremylongshore

1.0K

Analyzes web cookie security configurations to detect vulnerabilities and ensure secure implementation of HttpOnly, Secure, and SameSite attributes.

HttpOnly
Secure Flag
Cookie Auditing
4. Security & Compliance

performing-security-audits

jeremylongshore

1.0K

Conducts comprehensive security audits including vulnerability scanning, compliance checks, and infrastructure analysis to identify and mitigate security risks.

Vulnerability Scanning
Compliance
Infrastructure Security
4. Security & Compliance

detecting-sql-injection-vulnerabilities

jeremylongshore

1.0K

Detects SQL injection vulnerabilities in codebases and provides remediation guidance using a dedicated plugin.

SQL Injection
Static Analysis
Code Auditing
4. Security & Compliance

implementing-database-audit-logging

jeremylongshore

1.0K

Implements database audit logging to track changes for compliance and security monitoring via triggers, CDC, or native logs.

Audit Logging
Database Triggers
Compliance Monitoring
4. Security & Compliance
PreviousPage 14 of 151 PageNext