4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

firecrawl-security-basics

jeremylongshore

1.0K

Applies FireCrawl security best practices for secrets management, access control, and API key security implementation.

FireCrawl
Secrets Management
Least Privilege
4. Security & Compliance

content-security-policy-generator

jeremylongshore

1.0K

Generates Content Security Policy (CSP) rules to prevent cross-site scripting (XSS) and other web security vulnerabilities in applications.

CSP
XSS
Web Security
4. Security & Compliance

scanning-input-validation-practices

jeremylongshore

1.0K

Scans user input handling for validation flaws and injection risks, such as SQLi and XSS, to enhance application security.

Input Validation
Injection Risks
Code Auditing
4. Security & Compliance

checking-session-security

jeremylongshore

1.0K

Identifies session security flaws including insecure IDs, missing expiration, and session fixation risks in codebases.

Session Fixation
Insecure Session IDs
Code Auditing
4. Security & Compliance

forensics-data-collector

jeremylongshore

1.0K

Automatically processes digital forensics data collection operations for security investigations within the Security Advanced category.

Digital Forensics
Security
4. Security & Compliance

checking-infrastructure-compliance

jeremylongshore

1.0K

Checks infrastructure configurations against SOC2, HIPAA, and PCI-DSS standards, identifying compliance violations and generating audit reports.

SOC2
HIPAA
PCI-DSS
4. Security & Compliance

performing-security-testing

jeremylongshore

1.0K

Automates security vulnerability testing for web applications and APIs, covering OWASP Top 10 and common flaws.

OWASP
SQL Injection
XSS
4. Security & Compliance

cursor-api-key-management

jeremylongshore

1.0K

Manages secure storage and authentication for API keys (OpenAI, Anthropic) within Cursor, preventing exposure in code.

API Keys
Authentication
Cursor
4. Security & Compliance

retellai-data-handling

jeremylongshore

1.0K

Enables GDPR and CCPA compliance for Retell AI integrations through PII handling, data redaction, and retention policy configuration.

PII
GDPR
CCPA
4. Security & Compliance

hipaa-audit-helper

jeremylongshore

1.0K

Automates HIPAA compliance audit processes with real-time documentation and regulatory checklists.

HIPAA
Compliance
Audit
4. Security & Compliance

generating-compliance-reports

jeremylongshore

1.0K

Generates comprehensive compliance reports for security standards, aiding in documentation and audit readiness.

Compliance Reporting
Security Audit
4. Security & Compliance

scanning-container-security

jeremylongshore

1.0K

Scans container images and running containers for vulnerabilities using Trivy and Snyk, identifying security risks in container environments.

Trivy
Snyk
Container Security
4. Security & Compliance

network-security-scanner

jeremylongshore

1.0K

Scans networks for security vulnerabilities and assesses security posture. Automatically activates for Security Advanced functionality.

Network Scanning
Vulnerability Assessment
4. Security & Compliance

customerio-security-basics

jeremylongshore

1.0K

Applies security best practices for Customer.io, focusing on secure integrations, PII handling, and access controls to ensure GDPR compliance.

Customer.io
PII
GDPR
4. Security & Compliance

openrouter-compliance-review

jeremylongshore

1.0K

Executes security and compliance reviews for OpenRouter integrations to prepare for audits and security assessments.

OpenRouter
Security Assessment
Compliance Audit
4. Security & Compliance

password-hash-generator

jeremylongshore

1.0K

Generates secure password hashes using industry-standard algorithms for secure password storage and authentication.

Password Hashing
bcrypt
4. Security & Compliance

groq-data-handling

jeremylongshore

1.0K

Enables GDPR and CCPA compliance for Groq integrations through PII handling, data redaction, and retention policy configuration.

PII
GDPR
CCPA
4. Security & Compliance

instantly-security-basics

jeremylongshore

1.0K

Applies security best practices for managing secrets and access control, including API key security and least privilege implementation.

Secrets Management
Access Control
Least Privilege
4. Security & Compliance

scanning-input-validation-practices

jeremylongshore

1.0K

Automatically scans source code for input validation vulnerabilities, identifying risks like SQL injection and XSS to prevent security exploits.

Input Validation
SQL Injection
XSS
4. Security & Compliance

firecrawl-data-handling

jeremylongshore

1.0K

Enforces GDPR and CCPA compliance for FireCrawl data handling, including PII redaction and retention policies.

PII
GDPR
CCPA
4. Security & Compliance

key-rotation-manager

jeremylongshore

1.0K

Automates cryptographic key rotation to maintain system security, prevent key compromise, and ensure compliance with security protocols.

Key Rotation
Cryptographic Keys
Security Automation
4. Security & Compliance

auditing-wallet-security

jeremylongshore

1.0K

Audits cryptocurrency wallet security by analyzing token approvals, permissions, and transaction patterns to identify risk exposure.

Token Approvals
Transaction Patterns
Wallet Audit
4. Security & Compliance

env-secret-detector

jeremylongshore

1.0K

Detects exposed environment secrets in code to prevent accidental exposure. Auto-activating security tool for developers.

Environment Variables
Secrets Detection
Security Scanning
4. Security & Compliance

waf-rule-creator

jeremylongshore

1.0K

Automates creation and activation of Web Application Firewall (WAF) rules to enhance security configurations in advanced security systems.

WAF
Rule Creation
Security Configuration
4. Security & Compliance
PreviousPage 20 of 151 PageNext