4. Security & Compliance
Found 3608 skills
scanning-for-gdpr-compliance
jeremylongshore
Scans data handling practices for GDPR compliance, identifying gaps to meet EU data protection regulations.
posthog-data-handling
jeremylongshore
Enables GDPR/CCPA compliance for PostHog through PII handling, data retention policies, and privacy pattern implementation.
auditing-access-control
jeremylongshore
Audits access control for security vulnerabilities and misconfigurations in authentication and authorization systems.
firebase-rules-generator
jeremylongshore
Generates Firebase security rules for database access control, ensuring secure data handling in Google Cloud Platform applications.
checking-owasp-compliance
jeremylongshore
Automates OWASP Top 10 (2021) vulnerability scanning and compliance auditing for applications, delivering gap analysis and remediation steps.
analyzing-security-headers
jeremylongshore
Analyzes HTTP security headers for a domain to detect vulnerabilities, misconfigurations, and provide a security grade with improvement recommendations.
fuzzing-apis
jeremylongshore
Performs automated API fuzzing to discover security vulnerabilities, edge cases, and crashes in API endpoints.
ideogram-security-basics
jeremylongshore
Applies security best practices for managing secrets and access control in Ideogram, including API key security and least privilege implementation.
kubernetes-rbac-analyzer
jeremylongshore
Automatically analyzes Kubernetes RBAC configurations to detect security misconfigurations and compliance issues.
detecting-sql-injection-vulnerabilities
jeremylongshore
Detects SQL injection vulnerabilities in codebases and provides remediation guidance using dedicated security analysis.
supabase-enterprise-rbac
jeremylongshore
Configures Supabase enterprise features including SSO, role-based access control, and organization management for secure access and permissions.
langchain-enterprise-rbac
jeremylongshore
Enables role-based access control (RBAC) for LangChain applications, supporting enterprise security, multi-tenancy, and user permission management.
clerk-security-basics
jeremylongshore
Provides security best practices for Clerk authentication implementation, including configuration hardening to prevent common vulnerabilities.
windsurf-security-basics
jeremylongshore
Applies Windsurf security best practices for secrets management and access control, including least privilege implementation.
assisting-with-soc2-audit-preparation
jeremylongshore
Automates SOC2 audit evidence gathering, gap identification, and remediation suggestions for compliance.
ideogram-enterprise-rbac
jeremylongshore
Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for Ideogram.
generating-security-audit-reports
jeremylongshore
Generates comprehensive security audit reports with vulnerability insights, compliance status, and remediation recommendations for systems and applications.
checking-infrastructure-compliance
jeremylongshore
Checks infrastructure configurations against SOC2, HIPAA, and PCI-DSS standards, identifying compliance violations and generating reports.
validating-pci-dss-compliance
jeremylongshore
Assesses codebases and infrastructure for PCI DSS compliance, identifying vulnerabilities and deviations from security standards.
validating-csrf-protection
jeremylongshore
Validates CSRF protection mechanisms in web applications, identifying vulnerabilities through token checks, SameSite attributes, and origin validation.
finding-security-misconfigurations
jeremylongshore
Identifies security misconfigurations in infrastructure-as-code, application settings, and system configurations, pinpointing vulnerabilities and compliance issues.
pci-dss-validator
jeremylongshore
Validates systems against PCI DSS compliance requirements, ensuring secure handling of payment card data per industry standards.
security-headers-generator
jeremylongshore
Generates security headers for web applications to enhance protection against common vulnerabilities and comply with security standards.
iso27001-gap-analyzer
jeremylongshore
Analyzes gaps in ISO 27001 information security management system compliance, delivering audit-ready gap assessment reports.