4. Security & Compliance
Found 3608 skills
firecrawl-security-basics
jeremylongshore
Applies FireCrawl security best practices for secrets management, access control, and API key security implementation.
content-security-policy-generator
jeremylongshore
Generates Content Security Policy (CSP) rules to prevent cross-site scripting (XSS) and other web security vulnerabilities in applications.
scanning-input-validation-practices
jeremylongshore
Scans user input handling for validation flaws and injection risks, such as SQLi and XSS, to enhance application security.
checking-session-security
jeremylongshore
Identifies session security flaws including insecure IDs, missing expiration, and session fixation risks in codebases.
forensics-data-collector
jeremylongshore
Automatically processes digital forensics data collection operations for security investigations within the Security Advanced category.
checking-infrastructure-compliance
jeremylongshore
Checks infrastructure configurations against SOC2, HIPAA, and PCI-DSS standards, identifying compliance violations and generating audit reports.
performing-security-testing
jeremylongshore
Automates security vulnerability testing for web applications and APIs, covering OWASP Top 10 and common flaws.
cursor-api-key-management
jeremylongshore
Manages secure storage and authentication for API keys (OpenAI, Anthropic) within Cursor, preventing exposure in code.
retellai-data-handling
jeremylongshore
Enables GDPR and CCPA compliance for Retell AI integrations through PII handling, data redaction, and retention policy configuration.
hipaa-audit-helper
jeremylongshore
Automates HIPAA compliance audit processes with real-time documentation and regulatory checklists.
generating-compliance-reports
jeremylongshore
Generates comprehensive compliance reports for security standards, aiding in documentation and audit readiness.
scanning-container-security
jeremylongshore
Scans container images and running containers for vulnerabilities using Trivy and Snyk, identifying security risks in container environments.
network-security-scanner
jeremylongshore
Scans networks for security vulnerabilities and assesses security posture. Automatically activates for Security Advanced functionality.
customerio-security-basics
jeremylongshore
Applies security best practices for Customer.io, focusing on secure integrations, PII handling, and access controls to ensure GDPR compliance.
openrouter-compliance-review
jeremylongshore
Executes security and compliance reviews for OpenRouter integrations to prepare for audits and security assessments.
password-hash-generator
jeremylongshore
Generates secure password hashes using industry-standard algorithms for secure password storage and authentication.
groq-data-handling
jeremylongshore
Enables GDPR and CCPA compliance for Groq integrations through PII handling, data redaction, and retention policy configuration.
instantly-security-basics
jeremylongshore
Applies security best practices for managing secrets and access control, including API key security and least privilege implementation.
scanning-input-validation-practices
jeremylongshore
Automatically scans source code for input validation vulnerabilities, identifying risks like SQL injection and XSS to prevent security exploits.
firecrawl-data-handling
jeremylongshore
Enforces GDPR and CCPA compliance for FireCrawl data handling, including PII redaction and retention policies.
key-rotation-manager
jeremylongshore
Automates cryptographic key rotation to maintain system security, prevent key compromise, and ensure compliance with security protocols.
auditing-wallet-security
jeremylongshore
Audits cryptocurrency wallet security by analyzing token approvals, permissions, and transaction patterns to identify risk exposure.
env-secret-detector
jeremylongshore
Detects exposed environment secrets in code to prevent accidental exposure. Auto-activating security tool for developers.
waf-rule-creator
jeremylongshore
Automates creation and activation of Web Application Firewall (WAF) rules to enhance security configurations in advanced security systems.