4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

analyzing-dependencies

jeremylongshore

1.0K

Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across multiple package managers.

Dependency Check
Vulnerability Scanning
License Compliance
4. Security & Compliance

performing-security-audits

jeremylongshore

1.0K

Conducts comprehensive security audits including vulnerability scanning, compliance checks, and infrastructure analysis to identify and mitigate security risks.

Vulnerability Scanning
Compliance Checking
Infrastructure Security
4. Security & Compliance

password-strength-analyzer

jeremylongshore

1.0K

Automatically analyzes password strength to enforce security standards and prevent weak password usage in systems.

Password Strength
Security Compliance
Password Policy
4. Security & Compliance

insecure-deserialization-checker

jeremylongshore

1.0K

Checks application code for insecure deserialization vulnerabilities to prevent security breaches during development.

Insecure Deserialization
Security Vulnerability
Code Auditing
4. Security & Compliance

sql-injection-detector

jeremylongshore

1.0K

Real-time detection of SQL injection attempts to prevent database attacks. Auto-activates for security fundamentals tasks.

SQL Injection
Security Scanner
Vulnerability Detection
4. Security & Compliance

zero-trust-config-helper

jeremylongshore

1.0K

Automates zero trust security configuration for systems and services, ensuring strict access controls and compliance.

Zero Trust
Security Configuration
Compliance
4. Security & Compliance

license-compliance-scanner

jeremylongshore

1.0K

Scans software components for license compliance, ensuring adherence to open-source and legal requirements in security contexts.

License Compliance
Open Source
Security Audit
4. Security & Compliance

plugin-auditor

jeremylongshore

1.0K

Automates security vulnerability checks, best practices validation, and CLAUDE.md compliance for Claude Code plugins in designated repositories.

Security Auditing
CLAUDE.md
Code Compliance
4. Security & Compliance

auditing-access-control

jeremylongshore

1.0K

Audits access control systems for vulnerabilities, misconfigurations, and compliance with security best practices in cloud and application environments.

IAM
ACL
Privilege Escalation
4. Security & Compliance

governance-checklist-generator

jeremylongshore

1.0K

Auto-generates regulatory compliance checklists to ensure adherence to governance standards in enterprise workflows.

Regulatory Compliance
Governance Checklist
4. Security & Compliance

gamma-data-handling

jeremylongshore

1.0K

Manages data privacy, retention, and GDPR compliance for Gamma integrations and user data workflows.

GDPR
Data Retention
Privacy
4. Security & Compliance

scanning-for-secrets

jeremylongshore

1.0K

Scans codebases for exposed secrets and credentials using pattern matching and entropy analysis to prevent security breaches.

Secret Scanning
Pattern Matching
Entropy Analysis
4. Security & Compliance

jwt-token-validator

jeremylongshore

1.0K

Validates JWT tokens for integrity and authenticity in authentication processes.

JWT
Token Validation
Authentication
4. Security & Compliance

assisting-with-soc2-audit-preparation

jeremylongshore

1.0K

Automates SOC 2 audit preparation by gathering evidence, assessing controls, and identifying compliance gaps against Trust Service Criteria.

SOC 2
Trust Service Criteria
Compliance Gap
4. Security & Compliance

oauth2-flow-helper

jeremylongshore

1.0K

Assists in implementing and managing OAuth2 authorization flows, ensuring secure authentication and access control.

OAuth2
Authorization
Security
4. Security & Compliance

integrating-secrets-managers

jeremylongshore

1.0K

Generates secure configurations and setup code for integrating with secrets managers like Hashicorp Vault and AWS Secrets Manager, following security best practices.

Hashicorp Vault
AWS Secrets Manager
Secure Credential Management
4. Security & Compliance

scanning-for-xss-vulnerabilities

jeremylongshore

1.0K

Automatically scans code for reflected, stored, and DOM-based XSS vulnerabilities, providing safe proof-of-concept payloads for security audits and code reviews.

XSS
Vulnerability Scanning
Security Audit
4. Security & Compliance

windsurf-audit-logging

jeremylongshore

1.0K

Configures AI interaction audit logging for compliance, activating on specific trigger phrases to handle security audit and regulatory requirements.

Audit Logging
Compliance
Security Audit
4. Security & Compliance

siem-rule-generator

jeremylongshore

1.0K

Generates security rules for SIEM systems to monitor and detect threats in real-time.

SIEM
Rule Generation
Threat Detection
4. Security & Compliance

vercel-data-handling

jeremylongshore

1.0K

Enables GDPR/CCPA-compliant data handling for Vercel, including PII redaction and retention policy configuration.

Vercel
GDPR
CCPA
4. Security & Compliance

responding-to-security-incidents

jeremylongshore

1.0K

Guides users through security incident response lifecycle, including classification, evidence collection, and remediation steps for breaches and ransomware.

Incident Response
Containment
Remediation
4. Security & Compliance

windsurf-webhooks-events

jeremylongshore

1.0K

Validates and processes Windsurf webhook events securely using signature verification to prevent tampering and unauthorized access.

Webhook
Signature Verification
Windsurf
4. Security & Compliance

posthog-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise security features in PostHog including SSO, role-based access control, and organization management.

PostHog
SSO
RBAC
4. Security & Compliance

implementing-database-audit-logging

jeremylongshore

1.0K

Provides implementation guidance for database audit logging, including strategies like CDC and trigger-based logging, to ensure compliance.

Audit Logging
Compliance
CDC
4. Security & Compliance
PreviousPage 18 of 151 PageNext