4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

oauth2-flow-helper

jeremylongshore

1.0K

Assists in configuring OAuth 2.0 flow operations for secure authorization and authentication processes.

OAuth2
Authorization
Authentication
4. Security & Compliance

validating-csrf-protection

jeremylongshore

1.0K

Validates CSRF protection mechanisms including tokens, cookies, and SameSite attributes to identify vulnerabilities in web applications.

CSRF
SameSite
Token
4. Security & Compliance

wcag22-a11y-audit

AIPexStudio

1.0K

Systematically evaluates web pages against WCAG 2.2 Success Criteria using accessibility tree inspection and visual analysis for compliance auditing.

WCAG 2.2
Accessibility Audit
Success Criteria
4. Security & Compliance

github-archive

gadievron

1.0K

Provides forensic analysis of GitHub events via BigQuery to investigate security incidents, verify repository activity, and reconstruct attack timelines with immutable evidence.

BigQuery
GitHub Archive
Forensic Analysis
4. Security & Compliance

github-evidence-kit

gadievron

1.0K

Generates, exports, loads, and verifies forensic evidence from GitHub sources including API, archives, and security reports for security investigations and compliance.

Forensic Evidence
GitHub API
Security Investigations
4. Security & Compliance

security-review

cfrs2005

972

Provides security checklists and patterns for authentication, input handling, secrets management, and API endpoints in sensitive features.

Authentication
Input Validation
Secrets Management
4. Security & Compliance

secrets-manager

itsmostafa

965

Manages secure storage, rotation, and retrieval of secrets (like credentials) in AWS, ensuring compliance and reducing security risks.

AWS Secrets Manager
Secret Rotation
Credentials
4. Security & Compliance

cognito

itsmostafa

965

Provides AWS Cognito user authentication and authorization services, including user pools, OAuth flows, and social identity integration.

Cognito
User Pools
OAuth
4. Security & Compliance

auth-tool-cloudbase

TencentCloudBase

938

Configures and manages authentication providers (e.g., OAuth, SAML, Email) for web applications using CloudBase Auth tool and MCP.

CloudBase Auth
Authentication Providers
MCP
4. Security & Compliance

auth-tool-cloudbase

TencentCloudBase

938

Configures and manages authentication providers (e.g., email, Google, OAuth) for web applications using CloudBase Auth and MCP API.

CloudBase Auth
Authentication Providers
MCP
4. Security & Compliance

llvm-security

gmh5225

775

Expertise in LLVM security features for compiler-based exploit mitigation, vulnerability analysis, and application hardening.

LLVM
Sanitizers
Hardening
4. Security & Compliance

static-analysis

gmh5225

775

Enables LLVM-based static analysis for security scanners, bug detection, and code quality assessment.

LLVM
Taint Tracking
Pointer Analysis
4. Security & Compliance

llvm-obfuscation

gmh5225

775

Expertise in LLVM-based code obfuscation for enhancing software security via anti-reverse engineering techniques like control flow flattening and string encryption.

LLVM
Control Flow Flattening
String Encryption
4. Security & Compliance

binary-lifting

gmh5225

775

Converts machine code to LLVM IR for reverse engineering, binary analysis, decompilation, and deobfuscation.

LLVM IR
Reverse Engineering
Binary Analysis
4. Security & Compliance

audit-extractor

Layr-Labs

710

Extracts findings from PDF audit reports and converts them into a markdown checklist for action items.

PDF
Audit
Markdown
4. Security & Compliance

ghidra

mitsuhiko

642

Headless binary reverse engineering with Ghidra for decompiling executables, extracting functions, and analyzing call graphs without GUI.

Ghidra
Headless
Binary Analysis
4. Security & Compliance

data-safety-auditor

ananddtyagi

623

Comprehensive auditor for Vue 3 applications using Pinia, IndexedDB, and PouchDB, identifying data safety risks and providing remediation guidance.

Vue 3
IndexedDB
PouchDB
4. Security & Compliance

security-automation

Ed1s0nZ

564

Automates security testing, vulnerability scanning, and compliance validation to strengthen organizational security posture.

Vulnerability Scanning
Compliance Automation
Security Orchestration
4. Security & Compliance

xss-testing

Ed1s0nZ

564

Performs security testing to identify and validate Cross-Site Scripting (XSS) vulnerabilities in web applications.

XSS
Penetration Testing
Web Security
4. Security & Compliance

command-injection-testing

Ed1s0nZ

564

Specializes in identifying and testing command injection vulnerabilities in applications to prevent unauthorized system command execution.

Command Injection
Penetration Testing
Vulnerability Assessment
4. Security & Compliance

sql-injection-testing

Ed1s0nZ

564

Specialized methodology for identifying and testing SQL injection vulnerabilities in web applications.

SQL Injection
Penetration Testing
Web Security
4. Security & Compliance

xxe-testing

Ed1s0nZ

564

Specialized methodology for identifying and testing XML External Entity (XXE) injection vulnerabilities in web applications.

XXE
Penetration Testing
Security Vulnerability
4. Security & Compliance

mobile-app-security-testing

Ed1s0nZ

564

Specializes in identifying vulnerabilities and ensuring security compliance in mobile applications through systematic testing methodologies.

Mobile Security
Penetration Testing
Vulnerability Assessment
4. Security & Compliance

secure-code-review

Ed1s0nZ

564

Performs security-focused code reviews to identify vulnerabilities and enforce secure coding standards.

Code Auditing
Vulnerability Assessment
Secure Coding
4. Security & Compliance
PreviousPage 22 of 151 PageNext