4. Security & Compliance
Found 3608 skills
solidity-security
Microck
Provides security best practices and patterns for writing and auditing Solidity smart contracts to prevent common vulnerabilities.
ga4-privacy-compliance
Microck
Expert guidance for GA4 privacy compliance including GDPR, CCPA, Consent Mode v2, data deletion, and consent configuration.
recon-nmap
aiskillstore
Conducts network reconnaissance, service enumeration, and vulnerability detection via Nmap for security audits and compliance assessments.
security-report
aiskillstore
Generates DOCX security assessment reports with vulnerability findings, risk ratings, and remediation steps for audits and compliance documentation.
security-management
aiskillstore
Manages security policies, firewall zones, access control rules, and guest network access; conducts security audits and compliance reviews.
flywheel-discord
aiskillstore
Enforces strict security protocols and data isolation rules for public community operations in the Agent Flywheel Hub Discord server.
dast-ffuf
aiskillstore
High-performance web fuzzer for DAST testing, enabling directory enumeration, parameter fuzzing, and virtual host discovery to identify security vulnerabilities.
coercion-duress
aiskillstore
Manages cases of forced surrenders, threats, and lack of informed consent in the Coercion_Duress queue for compliance verification.
stride-analysis-patterns
aiskillstore
Applies STRIDE methodology for systematic threat identification in security analysis, threat modeling, and documentation.
gdpr-compliance
aiskillstore
Provides guidance for implementing and reviewing GDPR-compliant features in Empathy Ledger to ensure regulatory data protection standards.
dependency-security
aiskillstore
Enforces dependency security scanning and SBOM generation, covering OWASP Dependency Check and npm audit for supply chain security.
mtls-configuration
aiskillstore
Configures mutual TLS (mTLS) for zero-trust service-to-service communication, ensuring certificate-based authentication and encryption.
security-gate
aiskillstore
Verifies security considerations are addressed before shipping, issuing warnings for unresolved issues requiring remediation.
privilege-escalation-knowledge
aiskillstore
Provides comprehensive knowledge on Linux privilege escalation techniques, including enumeration and exploitation of SUID, sudo, kernel, and misconfigurations to capture root flags.
dast-zap
aiskillstore
Performs dynamic security testing on web applications and APIs using OWASP ZAP, detecting vulnerabilities and generating compliance reports.
security-sentinel
aiskillstore
Audits code for security vulnerabilities against OWASP Top 10, focusing on authentication, API routes, and sensitive data handling.
compliance-checker
aiskillstore
Automates code review against security compliance standards to ensure adherence to best practices and regulatory requirements.
exploitation-knowledge
aiskillstore
Expertise in vulnerability exploitation, initial access, and common attack vectors including SQLi and RCE.
sast-bandit
aiskillstore
Scans Python code for security vulnerabilities including hardcoded secrets and injection flaws, with remediation guidance for CI/CD pipelines.
when-auditing-security-use-security-analyzer
aiskillstore
Conducts comprehensive security audits including static analysis, dependency vulnerability checks, secrets detection, and OWASP compliance verification.
delon-auth-authentication-authorization
aiskillstore
Provides secure authentication and authorization implementation using @delon/auth, including JWT management, RBAC, route guards, and Firebase Auth integration.
surveillance-monitoring
aiskillstore
Monitors Ubiquiti Protect surveillance systems, tracking camera status, reviewing recordings, and alerting on security events and system health.
security-requirement-extraction
aiskillstore
Derives security requirements from threat models and business context to create actionable security user stories and test cases.
security-engineering
aiskillstore
Designs security controls, implements authentication/authorization, conducts threat modeling, and ensures compliance with security frameworks.