4. Security & Compliance
Found 3608 skills
oauth2-flow-helper
jeremylongshore
Assists in configuring OAuth 2.0 flow operations for secure authorization and authentication processes.
validating-csrf-protection
jeremylongshore
Validates CSRF protection mechanisms including tokens, cookies, and SameSite attributes to identify vulnerabilities in web applications.
wcag22-a11y-audit
AIPexStudio
Systematically evaluates web pages against WCAG 2.2 Success Criteria using accessibility tree inspection and visual analysis for compliance auditing.
github-archive
gadievron
Provides forensic analysis of GitHub events via BigQuery to investigate security incidents, verify repository activity, and reconstruct attack timelines with immutable evidence.
github-evidence-kit
gadievron
Generates, exports, loads, and verifies forensic evidence from GitHub sources including API, archives, and security reports for security investigations and compliance.
security-review
cfrs2005
Provides security checklists and patterns for authentication, input handling, secrets management, and API endpoints in sensitive features.
secrets-manager
itsmostafa
Manages secure storage, rotation, and retrieval of secrets (like credentials) in AWS, ensuring compliance and reducing security risks.
cognito
itsmostafa
Provides AWS Cognito user authentication and authorization services, including user pools, OAuth flows, and social identity integration.
auth-tool-cloudbase
TencentCloudBase
Configures and manages authentication providers (e.g., OAuth, SAML, Email) for web applications using CloudBase Auth tool and MCP.
auth-tool-cloudbase
TencentCloudBase
Configures and manages authentication providers (e.g., email, Google, OAuth) for web applications using CloudBase Auth and MCP API.
llvm-security
gmh5225
Expertise in LLVM security features for compiler-based exploit mitigation, vulnerability analysis, and application hardening.
static-analysis
gmh5225
Enables LLVM-based static analysis for security scanners, bug detection, and code quality assessment.
llvm-obfuscation
gmh5225
Expertise in LLVM-based code obfuscation for enhancing software security via anti-reverse engineering techniques like control flow flattening and string encryption.
binary-lifting
gmh5225
Converts machine code to LLVM IR for reverse engineering, binary analysis, decompilation, and deobfuscation.
audit-extractor
Layr-Labs
Extracts findings from PDF audit reports and converts them into a markdown checklist for action items.
ghidra
mitsuhiko
Headless binary reverse engineering with Ghidra for decompiling executables, extracting functions, and analyzing call graphs without GUI.
data-safety-auditor
ananddtyagi
Comprehensive auditor for Vue 3 applications using Pinia, IndexedDB, and PouchDB, identifying data safety risks and providing remediation guidance.
security-automation
Ed1s0nZ
Automates security testing, vulnerability scanning, and compliance validation to strengthen organizational security posture.
xss-testing
Ed1s0nZ
Performs security testing to identify and validate Cross-Site Scripting (XSS) vulnerabilities in web applications.
command-injection-testing
Ed1s0nZ
Specializes in identifying and testing command injection vulnerabilities in applications to prevent unauthorized system command execution.
sql-injection-testing
Ed1s0nZ
Specialized methodology for identifying and testing SQL injection vulnerabilities in web applications.
xxe-testing
Ed1s0nZ
Specialized methodology for identifying and testing XML External Entity (XXE) injection vulnerabilities in web applications.
mobile-app-security-testing
Ed1s0nZ
Specializes in identifying vulnerabilities and ensuring security compliance in mobile applications through systematic testing methodologies.
secure-code-review
Ed1s0nZ
Performs security-focused code reviews to identify vulnerabilities and enforce secure coding standards.