4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

clerk-incident-runbook

jeremylongshore

1.0K

Guides teams through incident response for Clerk authentication outages, security incidents, and production authentication failures.

Clerk
Incident Response
Authentication
4. Security & Compliance

perplexity-data-handling

jeremylongshore

1.0K

Enforces PII handling, data retention policies, and GDPR/CCPA compliance for Perplexity integrations.

PII
GDPR
CCPA
4. Security & Compliance

performing-security-audits

jeremylongshore

1.0K

Conducts comprehensive security audits on code, infrastructure, and configurations using vulnerability scanning, compliance checks, and cryptography review.

Vulnerability Scanning
Compliance Checking
Cryptography Review
4. Security & Compliance

exa-security-basics

jeremylongshore

1.0K

Applies Exa security best practices for secrets management, least privilege access control, and API key security configuration auditing.

Secrets Management
Least Privilege
API Key Security
4. Security & Compliance

analyzing-dependencies

jeremylongshore

1.0K

Scans third-party dependencies for security vulnerabilities and outdated versions to enhance application security during audits.

Dependency Scanning
Vulnerability Scanning
Third-Party Libraries
4. Security & Compliance

coderabbit-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise SSO, RBAC, and organization management for CodeRabbit, enabling secure access control and permission management.

SSO
RBAC
SAML
4. Security & Compliance

plugin-auditor

jeremylongshore

1.0K

Automatically audits AI assistant code plugins for security vulnerabilities, best practices, and AI assistant.md compliance upon user request.

Security Auditing
AI Plugins
Compliance
4. Security & Compliance

klingai-compliance-review

jeremylongshore

1.0K

Executes compliance reviews for Kling AI integrations, ensuring regulatory adherence and security posture for audits and reviews.

Regulatory Compliance
Security Posture
Kling AI
4. Security & Compliance

scanning-input-validation-practices

jeremylongshore

1.0K

Automatically scans source code for input validation vulnerabilities, identifying unsanitized user data that could lead to SQL injection, XSS, or command injection.

Input Validation
SQL Injection
XSS
4. Security & Compliance

encrypting-and-decrypting-data

jeremylongshore

1.0K

Enables secure encryption and decryption of data using multiple algorithms to protect sensitive information upon user request.

Encryption
Decryption
Data Security
4. Security & Compliance

auditing-access-control

jeremylongshore

1.0K

Audits access control systems for vulnerabilities, misconfigurations, and compliance with security best practices in cloud and application environments.

IAM Policies
ACLs
4. Security & Compliance

deepgram-security-basics

jeremylongshore

1.0K

Applies Deepgram security best practices for API key management, data protection, and configuration auditing to secure integrations.

Deepgram
API Key Management
Data Protection
4. Security & Compliance

ideogram-webhooks-events

jeremylongshore

1.0K

Securely validates Ideogram webhook signatures and processes event notifications to prevent spoofing and ensure integrity.

Ideogram
Webhook Signature
Event Handling
4. Security & Compliance

plugin-auditor

jeremylongshore

1.0K

Automates security vulnerability checks, best practices validation, and CLAUDE.md compliance for Claude Code plugins upon user request.

Security Audit
CLAUDE.md
Plugin Compliance
4. Security & Compliance

dependency-vulnerability-checker

jeremylongshore

1.0K

Checks project dependencies for known security vulnerabilities to prevent exploitation in software supply chains.

Dependency Scanning
Vulnerability Assessment
4. Security & Compliance

xss-vulnerability-scanner

jeremylongshore

1.0K

Scans web applications for Cross-Site Scripting (XSS) vulnerabilities to identify and mitigate security risks.

XSS
Vulnerability Scanner
Security Testing
4. Security & Compliance

certificate-lifecycle-manager

jeremylongshore

1.0K

Automates digital certificate lifecycle management including issuance, renewal, and revocation for secure communications and compliance.

Certificate Management
PKI
Security Automation
4. Security & Compliance

performing-security-testing

jeremylongshore

1.0K

Automates security vulnerability testing for applications and APIs, covering OWASP Top 10, SQL injection, XSS, CSRF, and authentication flaws.

OWASP
SQL injection
XSS
4. Security & Compliance

encrypting-and-decrypting-data

jeremylongshore

1.0K

Enables secure encryption and decryption of data using multiple algorithms to protect sensitive information.

AES
RSA
Data Confidentiality
4. Security & Compliance

cloud-security-posture

jeremylongshore

1.0K

Automates cloud security posture assessment and remediation to enhance compliance and threat prevention.

Cloud Security
CSPM
Compliance
4. Security & Compliance

analyzing-security-headers

jeremylongshore

1.0K

Analyzes HTTP security headers for a domain, identifying vulnerabilities and misconfigurations, and provides a detailed report with grade, score, and improvement recommendations.

Security Headers
Vulnerability Scan
4. Security & Compliance

validating-cors-policies

jeremylongshore

1.0K

Validates CORS policies for security vulnerabilities and misconfigurations, ensuring safe cross-origin resource sharing in web applications.

CORS
Security Audit
Policy Validation
4. Security & Compliance

container-security-auditor

jeremylongshore

1.0K

Automates security audits for containerized applications to identify vulnerabilities and ensure regulatory compliance.

Container Security
Security Auditing
Compliance
4. Security & Compliance

juicebox-enterprise-rbac

jeremylongshore

1.0K

Configures role-based access control (RBAC) for Juicebox Enterprise, enabling secure team permissions and access policy implementation.

RBAC
Juicebox
Access Policies
4. Security & Compliance
PreviousPage 21 of 151 PageNext