4. Security & Compliance
Found 3608 skills
container-security-auditor
jeremylongshore
Audits container security configurations and operations to identify vulnerabilities and ensure compliance with security standards.
validating-authentication-implementations
jeremylongshore
Validates authentication implementations (JWT, OAuth, sessions, API keys) against security best practices, including password policies, MFA, and session security.
windsurf-enterprise-sso
jeremylongshore
Configures enterprise Single Sign-On (SSO) integration for Windsurf, managing identity provider setup and authentication flows for secure access.
validating-csrf-protection
jeremylongshore
Validates CSRF token implementation in web forms to identify security vulnerabilities in state-changing operations.
path-traversal-finder
jeremylongshore
Automatically detects path traversal vulnerabilities in web applications to enhance security posture.
juicebox-security-basics
jeremylongshore
Applies Juicebox-specific security best practices for API key management, access controls, and integration security audits.
apollo-security-basics
jeremylongshore
Applies security best practices for Apollo.io API integrations, including key management and secure data handling to prevent breaches.
lindy-data-handling
jeremylongshore
Provides best practices for managing sensitive data, ensuring privacy, and maintaining compliance with regulations like GDPR using Lindy AI.
scanning-for-secrets
jeremylongshore
Scans codebases for exposed secrets (API keys, passwords) using pattern matching and entropy analysis to prevent security breaches.
forensics-data-collector
jeremylongshore
Automates collection of digital forensic data for security investigations and incident response workflows.
validating-pci-dss-compliance
jeremylongshore
Assesses codebases and infrastructure for PCI DSS compliance, identifying security vulnerabilities and deviations from payment card data security standards.
pci-dss-validator
jeremylongshore
Validates compliance with Payment Card Industry Data Security Standard (PCI DSS) requirements for security operations. Automatically activates for PCI DSS validation tasks.
responding-to-security-incidents
jeremylongshore
Guides users through security incident response lifecycle, including classification, evidence collection, and remediation steps for breaches and ransomware.
penetration-test-planner
jeremylongshore
Automates penetration test planning with structured workflows for security assessments and vulnerability identification.
checking-infrastructure-compliance
jeremylongshore
Checks infrastructure configurations against SOC2, HIPAA, and PCI-DSS standards, identifying compliance violations and generating audit reports.
cors-policy-validator
jeremylongshore
Validates Cross-Origin Resource Sharing (CORS) policies to ensure secure web application configurations and prevent security vulnerabilities.
vastai-webhooks-events
jeremylongshore
Validates Vast.ai webhook signatures and securely handles event notifications for webhook endpoints.
scanning-for-gdpr-compliance
jeremylongshore
Scans applications and data systems for GDPR compliance, identifying violations in data protection, privacy rights, and consent management.
api-key-manager
jeremylongshore
Manages API keys securely, ensuring safe access control for API integrations and security fundamentals.
langchain-data-handling
jeremylongshore
Enforces data privacy and compliance best practices for LangChain applications, including PII protection and GDPR adherence.
csrf-protection-validator
jeremylongshore
Validates Cross-Site Request Forgery (CSRF) protection mechanisms to ensure secure web application functionality.
openrouter-data-privacy
jeremylongshore
Enforces data privacy and compliance controls for OpenRouter API requests, ensuring protection of PII and adherence to regulations like GDPR.
windsurf-dependency-management
jeremylongshore
Analyzes and updates project dependencies with vulnerability scanning to enhance security posture.
posthog-security-basics
jeremylongshore
Applies PostHog security best practices for secrets management, access control, and API key security implementation.