4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

implementing-database-audit-logging

jeremylongshore

1.0K

Guides database audit logging implementation for compliance, offering trigger-based, CDC, and application-level strategies with schema generation.

Audit Logging
Change Data Capture
Compliance
4. Security & Compliance

risk-assessment-creator

jeremylongshore

1.0K

Automates risk assessment creation for enterprise security and compliance workflows.

Risk Assessment
Compliance
Security
4. Security & Compliance

sql-injection-detector

jeremylongshore

1.0K

Automatically identifies SQL injection vulnerabilities in code and input to prevent security breaches.

SQL Injection
Vulnerability Detection
Code Auditing
4. Security & Compliance

hardcoded-credential-finder

jeremylongshore

1.0K

Automatically scans codebases for hardcoded credentials to detect security vulnerabilities and prevent unauthorized access.

Hardcoded Credentials
Code Auditing
Security Vulnerability
4. Security & Compliance

scanning-for-data-privacy-issues

jeremylongshore

1.0K

Scans systems for data privacy issues and sensitive information exposure to validate data handling practices and ensure compliance.

Data Privacy
Sensitive Data
Compliance
4. Security & Compliance

performing-penetration-testing

jeremylongshore

1.0K

Conducts security penetration testing to identify system vulnerabilities during security assessments.

Penetration Testing
Vulnerability Assessment
Security Testing
4. Security & Compliance

firebase-rules-generator

jeremylongshore

1.0K

Generates Firebase security rules for Firestore and Realtime Database, ensuring secure data access and compliance with security best practices.

Firebase
Security Rules
GCP
4. Security & Compliance

supabase-security-basics

jeremylongshore

1.0K

Applies Supabase security best practices including secret management and least privilege access control to secure API keys and configurations.

Supabase
Secrets
Access Control
4. Security & Compliance

fuzzing-apis

jeremylongshore

1.0K

Automates API fuzz testing to uncover vulnerabilities including SQL injection, XSS, and input validation flaws.

Fuzz Testing
API Security
Vulnerability Scanning
4. Security & Compliance

security-benchmark-runner

jeremylongshore

1.0K

Runs automated security benchmarks for compliance checks and vulnerability assessment in security frameworks.

Security Benchmarking
Compliance
Vulnerability Assessment
4. Security & Compliance

content-security-policy-generator

jeremylongshore

1.0K

Generates Content Security Policies (CSP) to prevent XSS and other web vulnerabilities, enhancing website security.

Content Security Policy
XSS
Security Headers
4. Security & Compliance

scanning-accessibility

jeremylongshore

1.0K

Audits websites for WCAG compliance, validating ARIA, keyboard navigation, and screen reader compatibility.

WCAG
ARIA
Screen Reader
4. Security & Compliance

https-certificate-checker

jeremylongshore

1.0K

Checks HTTPS certificate validity and security settings to ensure secure web connections and compliance with security standards.

HTTPS
Certificate Validation
TLS
4. Security & Compliance

code-injection-detector

jeremylongshore

1.0K

Detects code injection vulnerabilities to prevent security breaches in application code.

Code Injection
Vulnerability Detection
Security
4. Security & Compliance

detecting-sql-injection-vulnerabilities

jeremylongshore

1.0K

Detects SQL injection vulnerabilities in codebases using dedicated analysis, identifying flaws and providing remediation guidance.

SQL Injection
Code Auditing
Vulnerability Detection
4. Security & Compliance

secret-scanner

jeremylongshore

1.0K

Automates scanning for exposed secrets (e.g., API keys, passwords) in code and configurations to enhance security fundamentals.

Secret Scanning
API Keys
Security Auditing
4. Security & Compliance

openrouter-audit-logging

jeremylongshore

1.0K

Enables OpenRouter audit logging to meet regulatory compliance and security audit requirements through trigger phrases.

Audit Logging
Compliance
OpenRouter
4. Security & Compliance

validating-authentication-implementations

jeremylongshore

1.0K

Validates authentication implementations against security best practices, including JWT, OAuth, and session security.

JWT
OAuth
MFA
4. Security & Compliance

iam-policy-reviewer

jeremylongshore

1.0K

Automatically reviews IAM policies to ensure security compliance and identify potential access risks.

IAM Policy
Security Compliance
Policy Review
4. Security & Compliance

security-policy-generator

jeremylongshore

1.0K

Automatically generates security policies based on compliance frameworks and organizational requirements for enterprise security management.

Security Policies
Compliance Frameworks
Policy Templates
4. Security & Compliance

hipaa-audit-helper

jeremylongshore

1.0K

Assists in conducting HIPAA compliance audits with guidance for security assessments and regulatory adherence in healthcare data handling.

HIPAA
Compliance Audit
Security Assessment
4. Security & Compliance

vastai-security-basics

jeremylongshore

1.0K

Applies Vast.ai security best practices for secrets management and access control, including API key protection and least privilege implementation.

Vast.ai
Secrets Management
Access Control
4. Security & Compliance

analyzing-security-headers

jeremylongshore

1.0K

Analyzes HTTP security headers of a domain to detect vulnerabilities, misconfigurations, and provide security grades with improvement recommendations.

HTTP Security Headers
Security Audit
Vulnerability Scanning
4. Security & Compliance

scanning-container-security

jeremylongshore

1.0K

Scans container images and running containers for vulnerabilities using Trivy and Snyk, identifying security risks in container environments.

Trivy
Snyk
Container Vulnerability
4. Security & Compliance
PreviousPage 15 of 151 PageNext