4. Security & Compliance
Found 3608 skills
clerk-incident-runbook
jeremylongshore
Guides teams through incident response for Clerk authentication outages, security incidents, and production authentication failures.
perplexity-data-handling
jeremylongshore
Enforces PII handling, data retention policies, and GDPR/CCPA compliance for Perplexity integrations.
performing-security-audits
jeremylongshore
Conducts comprehensive security audits on code, infrastructure, and configurations using vulnerability scanning, compliance checks, and cryptography review.
exa-security-basics
jeremylongshore
Applies Exa security best practices for secrets management, least privilege access control, and API key security configuration auditing.
analyzing-dependencies
jeremylongshore
Scans third-party dependencies for security vulnerabilities and outdated versions to enhance application security during audits.
coderabbit-enterprise-rbac
jeremylongshore
Configures enterprise SSO, RBAC, and organization management for CodeRabbit, enabling secure access control and permission management.
plugin-auditor
jeremylongshore
Automatically audits AI assistant code plugins for security vulnerabilities, best practices, and AI assistant.md compliance upon user request.
klingai-compliance-review
jeremylongshore
Executes compliance reviews for Kling AI integrations, ensuring regulatory adherence and security posture for audits and reviews.
scanning-input-validation-practices
jeremylongshore
Automatically scans source code for input validation vulnerabilities, identifying unsanitized user data that could lead to SQL injection, XSS, or command injection.
encrypting-and-decrypting-data
jeremylongshore
Enables secure encryption and decryption of data using multiple algorithms to protect sensitive information upon user request.
auditing-access-control
jeremylongshore
Audits access control systems for vulnerabilities, misconfigurations, and compliance with security best practices in cloud and application environments.
deepgram-security-basics
jeremylongshore
Applies Deepgram security best practices for API key management, data protection, and configuration auditing to secure integrations.
ideogram-webhooks-events
jeremylongshore
Securely validates Ideogram webhook signatures and processes event notifications to prevent spoofing and ensure integrity.
plugin-auditor
jeremylongshore
Automates security vulnerability checks, best practices validation, and CLAUDE.md compliance for Claude Code plugins upon user request.
dependency-vulnerability-checker
jeremylongshore
Checks project dependencies for known security vulnerabilities to prevent exploitation in software supply chains.
xss-vulnerability-scanner
jeremylongshore
Scans web applications for Cross-Site Scripting (XSS) vulnerabilities to identify and mitigate security risks.
certificate-lifecycle-manager
jeremylongshore
Automates digital certificate lifecycle management including issuance, renewal, and revocation for secure communications and compliance.
performing-security-testing
jeremylongshore
Automates security vulnerability testing for applications and APIs, covering OWASP Top 10, SQL injection, XSS, CSRF, and authentication flaws.
encrypting-and-decrypting-data
jeremylongshore
Enables secure encryption and decryption of data using multiple algorithms to protect sensitive information.
cloud-security-posture
jeremylongshore
Automates cloud security posture assessment and remediation to enhance compliance and threat prevention.
analyzing-security-headers
jeremylongshore
Analyzes HTTP security headers for a domain, identifying vulnerabilities and misconfigurations, and provides a detailed report with grade, score, and improvement recommendations.
validating-cors-policies
jeremylongshore
Validates CORS policies for security vulnerabilities and misconfigurations, ensuring safe cross-origin resource sharing in web applications.
container-security-auditor
jeremylongshore
Automates security audits for containerized applications to identify vulnerabilities and ensure regulatory compliance.
juicebox-enterprise-rbac
jeremylongshore
Configures role-based access control (RBAC) for Juicebox Enterprise, enabling secure team permissions and access policy implementation.