4. Security & Compliance
Found 3608 skills
implementing-database-audit-logging
jeremylongshore
Guides database audit logging implementation for compliance, offering trigger-based, CDC, and application-level strategies with schema generation.
risk-assessment-creator
jeremylongshore
Automates risk assessment creation for enterprise security and compliance workflows.
sql-injection-detector
jeremylongshore
Automatically identifies SQL injection vulnerabilities in code and input to prevent security breaches.
hardcoded-credential-finder
jeremylongshore
Automatically scans codebases for hardcoded credentials to detect security vulnerabilities and prevent unauthorized access.
scanning-for-data-privacy-issues
jeremylongshore
Scans systems for data privacy issues and sensitive information exposure to validate data handling practices and ensure compliance.
performing-penetration-testing
jeremylongshore
Conducts security penetration testing to identify system vulnerabilities during security assessments.
firebase-rules-generator
jeremylongshore
Generates Firebase security rules for Firestore and Realtime Database, ensuring secure data access and compliance with security best practices.
supabase-security-basics
jeremylongshore
Applies Supabase security best practices including secret management and least privilege access control to secure API keys and configurations.
fuzzing-apis
jeremylongshore
Automates API fuzz testing to uncover vulnerabilities including SQL injection, XSS, and input validation flaws.
security-benchmark-runner
jeremylongshore
Runs automated security benchmarks for compliance checks and vulnerability assessment in security frameworks.
content-security-policy-generator
jeremylongshore
Generates Content Security Policies (CSP) to prevent XSS and other web vulnerabilities, enhancing website security.
scanning-accessibility
jeremylongshore
Audits websites for WCAG compliance, validating ARIA, keyboard navigation, and screen reader compatibility.
https-certificate-checker
jeremylongshore
Checks HTTPS certificate validity and security settings to ensure secure web connections and compliance with security standards.
code-injection-detector
jeremylongshore
Detects code injection vulnerabilities to prevent security breaches in application code.
detecting-sql-injection-vulnerabilities
jeremylongshore
Detects SQL injection vulnerabilities in codebases using dedicated analysis, identifying flaws and providing remediation guidance.
secret-scanner
jeremylongshore
Automates scanning for exposed secrets (e.g., API keys, passwords) in code and configurations to enhance security fundamentals.
openrouter-audit-logging
jeremylongshore
Enables OpenRouter audit logging to meet regulatory compliance and security audit requirements through trigger phrases.
validating-authentication-implementations
jeremylongshore
Validates authentication implementations against security best practices, including JWT, OAuth, and session security.
iam-policy-reviewer
jeremylongshore
Automatically reviews IAM policies to ensure security compliance and identify potential access risks.
security-policy-generator
jeremylongshore
Automatically generates security policies based on compliance frameworks and organizational requirements for enterprise security management.
hipaa-audit-helper
jeremylongshore
Assists in conducting HIPAA compliance audits with guidance for security assessments and regulatory adherence in healthcare data handling.
vastai-security-basics
jeremylongshore
Applies Vast.ai security best practices for secrets management and access control, including API key protection and least privilege implementation.
analyzing-security-headers
jeremylongshore
Analyzes HTTP security headers of a domain to detect vulnerabilities, misconfigurations, and provide security grades with improvement recommendations.
scanning-container-security
jeremylongshore
Scans container images and running containers for vulnerabilities using Trivy and Snyk, identifying security risks in container environments.