4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

solidity-security

Microck

108

Provides security best practices and patterns for writing and auditing Solidity smart contracts to prevent common vulnerabilities.

Solidity
Smart Contracts
Security Auditing
4. Security & Compliance

ga4-privacy-compliance

Microck

108

Expert guidance for GA4 privacy compliance including GDPR, CCPA, Consent Mode v2, data deletion, and consent configuration.

GA4
GDPR
CCPA
4. Security & Compliance

recon-nmap

aiskillstore

102

Conducts network reconnaissance, service enumeration, and vulnerability detection via Nmap for security audits and compliance assessments.

Nmap
Port Scanning
Vulnerability Detection
4. Security & Compliance

security-report

aiskillstore

102

Generates DOCX security assessment reports with vulnerability findings, risk ratings, and remediation steps for audits and compliance documentation.

Vulnerability Assessment
Penetration Testing
Compliance Audit
4. Security & Compliance

security-management

aiskillstore

102

Manages security policies, firewall zones, access control rules, and guest network access; conducts security audits and compliance reviews.

Firewall
ACL
Compliance
4. Security & Compliance

flywheel-discord

aiskillstore

102

Enforces strict security protocols and data isolation rules for public community operations in the Agent Flywheel Hub Discord server.

Discord
Data Isolation
Security Rules
4. Security & Compliance

dast-ffuf

aiskillstore

102

High-performance web fuzzer for DAST testing, enabling directory enumeration, parameter fuzzing, and virtual host discovery to identify security vulnerabilities.

ffuf
DAST
Parameter Fuzzing
4. Security & Compliance

coercion-duress

aiskillstore

102

Manages cases of forced surrenders, threats, and lack of informed consent in the Coercion_Duress queue for compliance verification.

Coercion
Duress
Informed Consent
4. Security & Compliance

stride-analysis-patterns

aiskillstore

102

Applies STRIDE methodology for systematic threat identification in security analysis, threat modeling, and documentation.

STRIDE
Threat Modeling
4. Security & Compliance

gdpr-compliance

aiskillstore

102

Provides guidance for implementing and reviewing GDPR-compliant features in Empathy Ledger to ensure regulatory data protection standards.

GDPR
Compliance
Data Privacy
4. Security & Compliance

dependency-security

aiskillstore

102

Enforces dependency security scanning and SBOM generation, covering OWASP Dependency Check and npm audit for supply chain security.

SBOM
npm audit
OWASP Dependency Check
4. Security & Compliance

mtls-configuration

aiskillstore

102

Configures mutual TLS (mTLS) for zero-trust service-to-service communication, ensuring certificate-based authentication and encryption.

mTLS
zero-trust
certificate management
4. Security & Compliance

security-gate

aiskillstore

102

Verifies security considerations are addressed before shipping, issuing warnings for unresolved issues requiring remediation.

Security Audit
Compliance Check
Pre-Release
4. Security & Compliance

privilege-escalation-knowledge

aiskillstore

102

Provides comprehensive knowledge on Linux privilege escalation techniques, including enumeration and exploitation of SUID, sudo, kernel, and misconfigurations to capture root flags.

SUID
sudo
Kernel Exploits
4. Security & Compliance

dast-zap

aiskillstore

102

Performs dynamic security testing on web applications and APIs using OWASP ZAP, detecting vulnerabilities and generating compliance reports.

OWASP ZAP
DAST
OWASP Top 10
4. Security & Compliance

security-sentinel

aiskillstore

102

Audits code for security vulnerabilities against OWASP Top 10, focusing on authentication, API routes, and sensitive data handling.

OWASP Top 10
Code Auditing
Authentication
4. Security & Compliance

compliance-checker

aiskillstore

102

Automates code review against security compliance standards to ensure adherence to best practices and regulatory requirements.

Code Auditing
Security Compliance
Regulatory Standards
4. Security & Compliance

exploitation-knowledge

aiskillstore

102

Expertise in vulnerability exploitation, initial access, and common attack vectors including SQLi and RCE.

SQL Injection
RCE
Reverse Shells
4. Security & Compliance

sast-bandit

aiskillstore

102

Scans Python code for security vulnerabilities including hardcoded secrets and injection flaws, with remediation guidance for CI/CD pipelines.

Bandit
SAST
Python
4. Security & Compliance

when-auditing-security-use-security-analyzer

aiskillstore

102

Conducts comprehensive security audits including static analysis, dependency vulnerability checks, secrets detection, and OWASP compliance verification.

Static Analysis
Dependency Vulnerabilities
OWASP
4. Security & Compliance

delon-auth-authentication-authorization

aiskillstore

102

Provides secure authentication and authorization implementation using @delon/auth, including JWT management, RBAC, route guards, and Firebase Auth integration.

@delon/auth
JWT
RBAC
4. Security & Compliance

surveillance-monitoring

aiskillstore

102

Monitors Ubiquiti Protect surveillance systems, tracking camera status, reviewing recordings, and alerting on security events and system health.

Ubiquiti Protect
Security Monitoring
Event Alerts
4. Security & Compliance

security-requirement-extraction

aiskillstore

102

Derives security requirements from threat models and business context to create actionable security user stories and test cases.

Threat Modeling
Security Requirements
Security User Stories
4. Security & Compliance

security-engineering

aiskillstore

102

Designs security controls, implements authentication/authorization, conducts threat modeling, and ensures compliance with security frameworks.

Security Architecture
Threat Modeling
Compliance Frameworks
4. Security & Compliance
PreviousPage 29 of 151 PageNext