4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

security-visual-testing

proffesor-for-testing

132

Security-first visual testing tool validating URLs, detecting PII, and performing visual regression with parallel viewport support for sensitive data applications requiring WCAG compliance.

PII
Visual Regression
WCAG
4. Security & Compliance

ops-safety

doccker

126

Triggers security guidelines for system-level commands (e.g., iptables, sysctl) and server operations to prevent unsafe configurations.

iptables
sysctl
Docker
4. Security & Compliance

flutter-security

HoangNguyen0403

111

Applies OWASP Mobile security standards to Flutter applications to prevent common mobile vulnerabilities.

Flutter
OWASP Mobile
Mobile Security
4. Security & Compliance

react-security

HoangNguyen0403

111

Provides security best practices for React applications, covering XSS prevention, authentication implementation, and dependency vulnerability management.

React
XSS
Authentication
4. Security & Compliance

typescript-security

HoangNguyen0403

111

Provides secure coding guidelines and practices for TypeScript to prevent common vulnerabilities and ensure application safety.

TypeScript
Secure Coding
Vulnerability Prevention
4. Security & Compliance

security-standards

HoangNguyen0403

111

Provides universal security protocols to build safe and resilient software applications through standardized security practices.

Security Protocols
Secure Development
Compliance
4. Security & Compliance

typescript-security

HoangNguyen0403

111

Provides secure coding guidelines and best practices for TypeScript applications to prevent common security vulnerabilities.

TypeScript
Secure Coding
Vulnerability Prevention
4. Security & Compliance

nestjs-security

HoangNguyen0403

111

Provides security features for NestJS applications including authentication, RBAC, and hardening standards.

Authentication
RBAC
Hardening
4. Security & Compliance

detection-coverage-analysis

MHaggis

110

Analyzes security detection coverage across Sigma, Splunk, and Elastic rules to assess threat coverage and generate MITRE Navigator layers.

Sigma
Splunk
Elastic
4. Security & Compliance

building-with-cloud-security

panaversity

109

Implements Kubernetes security patterns including RBAC, NetworkPolicies, secrets management, and compliance fundamentals.

Kubernetes
RBAC
Compliance
4. Security & Compliance

configuring-better-auth

panaversity

109

Configures OAuth 2.1 and OIDC authentication with Better Auth MCP for centralized SSO, Next.js clients, and token management.

OAuth 2.1
OIDC
PKCE
4. Security & Compliance

bitcoin-auth-diagnostics

Microck

108

Diagnoses and resolves Bitcoin authentication token generation, verification, and integration issues with the bitcoin-auth library.

Bitcoin-auth
Token Verification
Signature Verification
4. Security & Compliance

auth-implementation-patterns

Microck

108

Provides authentication and authorization patterns including JWT, OAuth2, and RBAC for secure API and application access control.

JWT
OAuth2
RBAC
4. Security & Compliance

bap-identity

Microck

108

Manages BAP identity files including creation, decryption, listing, extraction of backups, and handling .bep encrypted files for Bitcoin Attestation Protocol.

BAP
.bep
Encryption
4. Security & Compliance

claudisms

Microck

108

Enforces safe operational guidelines for Claude Code, ensuring terse responses, sequential execution, and preventing destructive actions without user confirmation.

Claude Code
Operational Guidelines
Destructive Operations
4. Security & Compliance

k8s-security-policies

Microck

108

Enforces production security in Kubernetes clusters using NetworkPolicy, PodSecurityPolicy, and RBAC implementations.

Kubernetes
NetworkPolicy
RBAC
4. Security & Compliance

claudeisms-operational-guidelines

Microck

108

Enforces strict operational protocols for AI task execution, ensuring sequential processing, minimal responses, and preventing destructive actions without user confirmation.

Operational Protocols
AI Safety
Confirmation Requirement
4. Security & Compliance

security-audit-example

Microck

108

Demonstrates code security auditing techniques to identify vulnerabilities in user-provided code.

Security Audit
Vulnerability Assessment
Code Review
4. Security & Compliance

network-security-setup

Microck

108

Configures network isolation, trusted domains, and access policies for secure Claude Code sandbox environments with environment variable management.

Network Isolation
Access Policies
Environment Variables
4. Security & Compliance

defense-in-depth

Microck

108

Enforces multi-layer data validation to prevent failures from invalid data, making bugs structurally impossible through defense-in-depth security practices.

Defense-in-depth
Data Validation
Layered Security
4. Security & Compliance

sast-configuration

Microck

108

Automates configuration of Static Application Security Testing (SAST) tools to detect code vulnerabilities in development pipelines.

SAST
Code Scanning
DevSecOps
4. Security & Compliance

pci-compliance

Microck

108

Provides tools for implementing PCI DSS compliance to secure payment card data handling and payment systems.

PCI DSS
Payment Security
Compliance
4. Security & Compliance

ffuf-web-fuzzing

Microck

108

Provides expert guidance for web fuzzing with ffuf during penetration testing, including authenticated scans and result analysis.

ffuf
penetration testing
web fuzzing
4. Security & Compliance

compliance-architecture

Microck

108

Provides enterprise compliance architecture for SOC 2, HIPAA, GDPR, and PCI-DSS with checklists, security controls, and audit guidance for cloud and serverless systems.

SOC 2
HIPAA
GDPR
4. Security & Compliance
PreviousPage 28 of 151 PageNext