4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

container-security-auditor

jeremylongshore

1.0K

Audits container security configurations and operations to identify vulnerabilities and ensure compliance with security standards.

Docker
Security Audit
Compliance
4. Security & Compliance

validating-authentication-implementations

jeremylongshore

1.0K

Validates authentication implementations (JWT, OAuth, sessions, API keys) against security best practices, including password policies, MFA, and session security.

JWT
OAuth
MFA
4. Security & Compliance

windsurf-enterprise-sso

jeremylongshore

1.0K

Configures enterprise Single Sign-On (SSO) integration for Windsurf, managing identity provider setup and authentication flows for secure access.

SSO
SAML
Identity Provider
4. Security & Compliance

validating-csrf-protection

jeremylongshore

1.0K

Validates CSRF token implementation in web forms to identify security vulnerabilities in state-changing operations.

CSRF
Token Validation
Security Audit
4. Security & Compliance

path-traversal-finder

jeremylongshore

1.0K

Automatically detects path traversal vulnerabilities in web applications to enhance security posture.

Path Traversal
Vulnerability Scanner
Web Security
4. Security & Compliance

juicebox-security-basics

jeremylongshore

1.0K

Applies Juicebox-specific security best practices for API key management, access controls, and integration security audits.

Juicebox
API Key Security
Access Control
4. Security & Compliance

apollo-security-basics

jeremylongshore

1.0K

Applies security best practices for Apollo.io API integrations, including key management and secure data handling to prevent breaches.

Apollo.io
API Security
Key Management
4. Security & Compliance

lindy-data-handling

jeremylongshore

1.0K

Provides best practices for managing sensitive data, ensuring privacy, and maintaining compliance with regulations like GDPR using Lindy AI.

GDPR
PII
Data Privacy
4. Security & Compliance

scanning-for-secrets

jeremylongshore

1.0K

Scans codebases for exposed secrets (API keys, passwords) using pattern matching and entropy analysis to prevent security breaches.

Secret Scanning
Pattern Matching
Entropy Analysis
4. Security & Compliance

forensics-data-collector

jeremylongshore

1.0K

Automates collection of digital forensic data for security investigations and incident response workflows.

Digital Forensics
Incident Response
4. Security & Compliance

validating-pci-dss-compliance

jeremylongshore

1.0K

Assesses codebases and infrastructure for PCI DSS compliance, identifying security vulnerabilities and deviations from payment card data security standards.

PCI DSS
Compliance Assessment
Security Audit
4. Security & Compliance

pci-dss-validator

jeremylongshore

1.0K

Validates compliance with Payment Card Industry Data Security Standard (PCI DSS) requirements for security operations. Automatically activates for PCI DSS validation tasks.

PCI DSS
Compliance
Security Validation
4. Security & Compliance

responding-to-security-incidents

jeremylongshore

1.0K

Guides users through security incident response lifecycle, including classification, evidence collection, and remediation steps for breaches and ransomware.

Incident Response
Containment
Remediation
4. Security & Compliance

penetration-test-planner

jeremylongshore

1.0K

Automates penetration test planning with structured workflows for security assessments and vulnerability identification.

Penetration Testing
Security Assessment
Vulnerability Identification
4. Security & Compliance

checking-infrastructure-compliance

jeremylongshore

1.0K

Checks infrastructure configurations against SOC2, HIPAA, and PCI-DSS standards, identifying compliance violations and generating audit reports.

SOC2
HIPAA
PCI-DSS
4. Security & Compliance

cors-policy-validator

jeremylongshore

1.0K

Validates Cross-Origin Resource Sharing (CORS) policies to ensure secure web application configurations and prevent security vulnerabilities.

CORS
Security Policy
Web Security
4. Security & Compliance

vastai-webhooks-events

jeremylongshore

1.0K

Validates Vast.ai webhook signatures and securely handles event notifications for webhook endpoints.

Vast.ai
Webhook
Signature Validation
4. Security & Compliance

scanning-for-gdpr-compliance

jeremylongshore

1.0K

Scans applications and data systems for GDPR compliance, identifying violations in data protection, privacy rights, and consent management.

GDPR
Data Privacy
Compliance Audit
4. Security & Compliance

api-key-manager

jeremylongshore

1.0K

Manages API keys securely, ensuring safe access control for API integrations and security fundamentals.

API Key Management
Access Control
4. Security & Compliance

langchain-data-handling

jeremylongshore

1.0K

Enforces data privacy and compliance best practices for LangChain applications, including PII protection and GDPR adherence.

LangChain
PII
GDPR
4. Security & Compliance

csrf-protection-validator

jeremylongshore

1.0K

Validates Cross-Site Request Forgery (CSRF) protection mechanisms to ensure secure web application functionality.

CSRF
Validation
Security
4. Security & Compliance

openrouter-data-privacy

jeremylongshore

1.0K

Enforces data privacy and compliance controls for OpenRouter API requests, ensuring protection of PII and adherence to regulations like GDPR.

PII
GDPR
OpenRouter
4. Security & Compliance

windsurf-dependency-management

jeremylongshore

1.0K

Analyzes and updates project dependencies with vulnerability scanning to enhance security posture.

Vulnerability Scanning
Dependency Management
npm
4. Security & Compliance

posthog-security-basics

jeremylongshore

1.0K

Applies PostHog security best practices for secrets management, access control, and API key security implementation.

PostHog
Secrets Management
Least Privilege
4. Security & Compliance
PreviousPage 16 of 151 PageNext