4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

scanning-for-gdpr-compliance

jeremylongshore

1.0K

Scans data handling practices for GDPR compliance, identifying gaps to meet EU data protection regulations.

GDPR
Data Protection
Compliance
4. Security & Compliance

posthog-data-handling

jeremylongshore

1.0K

Enables GDPR/CCPA compliance for PostHog through PII handling, data retention policies, and privacy pattern implementation.

PostHog
GDPR
CCPA
4. Security & Compliance

auditing-access-control

jeremylongshore

1.0K

Audits access control for security vulnerabilities and misconfigurations in authentication and authorization systems.

Access Control
Authorization
Security Audit
4. Security & Compliance

firebase-rules-generator

jeremylongshore

1.0K

Generates Firebase security rules for database access control, ensuring secure data handling in Google Cloud Platform applications.

Firebase
Security Rules
GCP
4. Security & Compliance

checking-owasp-compliance

jeremylongshore

1.0K

Automates OWASP Top 10 (2021) vulnerability scanning and compliance auditing for applications, delivering gap analysis and remediation steps.

OWASP Top 10
Vulnerability Scanning
Compliance Audit
4. Security & Compliance

analyzing-security-headers

jeremylongshore

1.0K

Analyzes HTTP security headers for a domain to detect vulnerabilities, misconfigurations, and provide a security grade with improvement recommendations.

Security Headers
Vulnerability Assessment
4. Security & Compliance

fuzzing-apis

jeremylongshore

1.0K

Performs automated API fuzzing to discover security vulnerabilities, edge cases, and crashes in API endpoints.

Fuzzing
API Security
Vulnerability Discovery
4. Security & Compliance

ideogram-security-basics

jeremylongshore

1.0K

Applies security best practices for managing secrets and access control in Ideogram, including API key security and least privilege implementation.

Ideogram
Secrets Management
Access Control
4. Security & Compliance

kubernetes-rbac-analyzer

jeremylongshore

1.0K

Automatically analyzes Kubernetes RBAC configurations to detect security misconfigurations and compliance issues.

Kubernetes
RBAC
Security
4. Security & Compliance

detecting-sql-injection-vulnerabilities

jeremylongshore

1.0K

Detects SQL injection vulnerabilities in codebases and provides remediation guidance using dedicated security analysis.

SQL Injection
Code Auditing
Vulnerability Detection
4. Security & Compliance

supabase-enterprise-rbac

jeremylongshore

1.0K

Configures Supabase enterprise features including SSO, role-based access control, and organization management for secure access and permissions.

Supabase
RBAC
SSO
4. Security & Compliance

langchain-enterprise-rbac

jeremylongshore

1.0K

Enables role-based access control (RBAC) for LangChain applications, supporting enterprise security, multi-tenancy, and user permission management.

LangChain
RBAC
Multi-tenancy
4. Security & Compliance

clerk-security-basics

jeremylongshore

1.0K

Provides security best practices for Clerk authentication implementation, including configuration hardening to prevent common vulnerabilities.

Clerk
Authentication
Hardening
4. Security & Compliance

windsurf-security-basics

jeremylongshore

1.0K

Applies Windsurf security best practices for secrets management and access control, including least privilege implementation.

Secrets Management
Least Privilege
Windsurf
4. Security & Compliance

assisting-with-soc2-audit-preparation

jeremylongshore

1.0K

Automates SOC2 audit evidence gathering, gap identification, and remediation suggestions for compliance.

SOC2
Compliance
Audit
4. Security & Compliance

ideogram-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for Ideogram.

SSO
RBAC
SAML
4. Security & Compliance

generating-security-audit-reports

jeremylongshore

1.0K

Generates comprehensive security audit reports with vulnerability insights, compliance status, and remediation recommendations for systems and applications.

Security Audit
Vulnerability Assessment
Compliance
4. Security & Compliance

checking-infrastructure-compliance

jeremylongshore

1.0K

Checks infrastructure configurations against SOC2, HIPAA, and PCI-DSS standards, identifying compliance violations and generating reports.

SOC2
HIPAA
PCI-DSS
4. Security & Compliance

validating-pci-dss-compliance

jeremylongshore

1.0K

Assesses codebases and infrastructure for PCI DSS compliance, identifying vulnerabilities and deviations from security standards.

PCI DSS
Compliance
Vulnerability
4. Security & Compliance

validating-csrf-protection

jeremylongshore

1.0K

Validates CSRF protection mechanisms in web applications, identifying vulnerabilities through token checks, SameSite attributes, and origin validation.

CSRF
SameSite
Token Validation
4. Security & Compliance

finding-security-misconfigurations

jeremylongshore

1.0K

Identifies security misconfigurations in infrastructure-as-code, application settings, and system configurations, pinpointing vulnerabilities and compliance issues.

Security Misconfiguration
Infrastructure-as-Code
Compliance Audit
4. Security & Compliance

pci-dss-validator

jeremylongshore

1.0K

Validates systems against PCI DSS compliance requirements, ensuring secure handling of payment card data per industry standards.

PCI DSS
Compliance
Security Validation
4. Security & Compliance

security-headers-generator

jeremylongshore

1.0K

Generates security headers for web applications to enhance protection against common vulnerabilities and comply with security standards.

Security Headers
HTTP Headers
Web Security
4. Security & Compliance

iso27001-gap-analyzer

jeremylongshore

1.0K

Analyzes gaps in ISO 27001 information security management system compliance, delivering audit-ready gap assessment reports.

ISO 27001
Compliance Audit
Gap Analysis
4. Security & Compliance
PreviousPage 19 of 151 PageNext