4. Security & Compliance
Found 3608 skills
analyzing-dependencies
jeremylongshore
Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across multiple package managers.
performing-security-audits
jeremylongshore
Conducts comprehensive security audits including vulnerability scanning, compliance checks, and infrastructure analysis to identify and mitigate security risks.
password-strength-analyzer
jeremylongshore
Automatically analyzes password strength to enforce security standards and prevent weak password usage in systems.
insecure-deserialization-checker
jeremylongshore
Checks application code for insecure deserialization vulnerabilities to prevent security breaches during development.
sql-injection-detector
jeremylongshore
Real-time detection of SQL injection attempts to prevent database attacks. Auto-activates for security fundamentals tasks.
zero-trust-config-helper
jeremylongshore
Automates zero trust security configuration for systems and services, ensuring strict access controls and compliance.
license-compliance-scanner
jeremylongshore
Scans software components for license compliance, ensuring adherence to open-source and legal requirements in security contexts.
plugin-auditor
jeremylongshore
Automates security vulnerability checks, best practices validation, and CLAUDE.md compliance for Claude Code plugins in designated repositories.
auditing-access-control
jeremylongshore
Audits access control systems for vulnerabilities, misconfigurations, and compliance with security best practices in cloud and application environments.
governance-checklist-generator
jeremylongshore
Auto-generates regulatory compliance checklists to ensure adherence to governance standards in enterprise workflows.
gamma-data-handling
jeremylongshore
Manages data privacy, retention, and GDPR compliance for Gamma integrations and user data workflows.
scanning-for-secrets
jeremylongshore
Scans codebases for exposed secrets and credentials using pattern matching and entropy analysis to prevent security breaches.
jwt-token-validator
jeremylongshore
Validates JWT tokens for integrity and authenticity in authentication processes.
assisting-with-soc2-audit-preparation
jeremylongshore
Automates SOC 2 audit preparation by gathering evidence, assessing controls, and identifying compliance gaps against Trust Service Criteria.
oauth2-flow-helper
jeremylongshore
Assists in implementing and managing OAuth2 authorization flows, ensuring secure authentication and access control.
integrating-secrets-managers
jeremylongshore
Generates secure configurations and setup code for integrating with secrets managers like Hashicorp Vault and AWS Secrets Manager, following security best practices.
scanning-for-xss-vulnerabilities
jeremylongshore
Automatically scans code for reflected, stored, and DOM-based XSS vulnerabilities, providing safe proof-of-concept payloads for security audits and code reviews.
windsurf-audit-logging
jeremylongshore
Configures AI interaction audit logging for compliance, activating on specific trigger phrases to handle security audit and regulatory requirements.
siem-rule-generator
jeremylongshore
Generates security rules for SIEM systems to monitor and detect threats in real-time.
vercel-data-handling
jeremylongshore
Enables GDPR/CCPA-compliant data handling for Vercel, including PII redaction and retention policy configuration.
responding-to-security-incidents
jeremylongshore
Guides users through security incident response lifecycle, including classification, evidence collection, and remediation steps for breaches and ransomware.
windsurf-webhooks-events
jeremylongshore
Validates and processes Windsurf webhook events securely using signature verification to prevent tampering and unauthorized access.
posthog-enterprise-rbac
jeremylongshore
Configures enterprise security features in PostHog including SSO, role-based access control, and organization management.
implementing-database-audit-logging
jeremylongshore
Provides implementation guidance for database audit logging, including strategies like CDC and trigger-based logging, to ensure compliance.