Loading...
Loading...
Found 5212 skills
jeremylongshore
Performs security log analysis to detect threats and anomalies, enhancing monitoring and incident response capabilities.
jeremylongshore
Automatically generates GCP firewall rules to secure network traffic and enforce security policies.
jeremylongshore
Scans container images and running containers for vulnerabilities using Trivy and Snyk to identify security risks.
jeremylongshore
Automates creation and management of security incident response plans for rapid breach containment and compliance adherence.
jeremylongshore
Configures enterprise SSO, role-based access control (RBAC), and organization management for Vast.ai platforms.
jeremylongshore
Provides security best practices for Granola meeting data, including implementation of security controls and compliance with data protection policies.
jeremylongshore
Validates CORS policies to identify security vulnerabilities, ensuring correct implementation and protection against unauthorized cross-origin requests.
jeremylongshore
Analyzes HTTP security headers to identify vulnerabilities, misconfigurations, and provide security recommendations for web applications.
jeremylongshore
Automates incident response planning configuration and activation for security teams within the Security Advanced framework.
jeremylongshore
Performs security and compliance audits for Cursor, focusing on SOC2 and GDPR standards. Triggered by specific audit-related phrases.
jeremylongshore
Performs comprehensive security vulnerability scanning on code, dependencies, and configurations, including CVE detection via static and dependency analysis.
jeremylongshore
Configures rate limiting parameters to prevent abuse and ensure system stability under high traffic loads.
jeremylongshore
Validates cryptographic signatures of incoming webhooks to ensure authenticity and prevent tampering in API integrations.
jeremylongshore
Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for Groq platforms.
jeremylongshore
Enables GDPR-compliant handling of personal and candidate data, ensuring privacy and regulatory adherence in data management processes.
jeremylongshore
Conducts security audits of HTTP headers to identify vulnerabilities and enforce secure configurations.
jeremylongshore
Provides security best practices for Lindy AI integrations, including API key management, permission configuration, and security controls implementation.
jeremylongshore
Automatically scans code for OWASP Top 10 vulnerabilities, identifies compliance gaps, and provides remediation guidance for security audits.
jeremylongshore
Automatically detects and alerts on exposed secrets in code repositories, preventing accidental credential leaks.
jeremylongshore
Automatically scans codebases, infrastructure, and documentation for HIPAA compliance issues, focusing on data privacy, security, and access controls.
jeremylongshore
Validates input validation mechanisms to prevent security vulnerabilities and ensure compliance.
jeremylongshore
Manages audio data storage, retention policies, and GDPR/HIPAA compliance for Deepgram transcription integrations.
jeremylongshore
Generates SIEM rules for security monitoring. Auto-activating tool for Security Advanced, triggered by 'siem rule generator' or similar phrases.
jeremylongshore
Automates GDPR compliance scanning to verify adherence to data protection regulations.