4. Security & Compliance
Found 3608 skills
configuring-better-auth
aiskillstore
Configures OAuth 2.1 and OIDC authentication with Better Auth, supporting SSO providers, Next.js clients, PKCE, and JWKS token verification.
accessibility-auditor
aiskillstore
Audits websites for WCAG 2.1 AA/AAA compliance, ADA adherence, and assistive technology compatibility using ARIA and semantic HTML.
container-hadolint
aiskillstore
Performs security linting on Dockerfiles against CIS benchmarks, detecting misconfigurations and hardcoded secrets to enforce secure container image builds.
webapp-sqlmap
aiskillstore
Automates SQL injection vulnerability detection, exploitation, and data extraction for authorized web application security assessments.
employment-contract-templates
aiskillstore
Creates legally compliant employment contracts, offer letters, and HR policies following labor regulations.
security-guardian
aiskillstore
Provides application security expertise for vulnerability detection, code auditing, and secure development practices covering OWASP Top 10, authentication, and cryptography.
wcag-audit-patterns
aiskillstore
Conducts automated and manual WCAG 2.2 accessibility audits with remediation guidance for website compliance.
claude-settings-audit
aiskillstore
Analyzes code repositories to recommend secure permissions settings for Claude Code, including read-only command allowances based on detected tech stack and project structure.
security-analyzer
aiskillstore
Comprehensive security vulnerability analysis for codebases, dependencies, containers, and IaC, with risk scoring and remediation plans.
auth
aiskillstore
Framework-agnostic authentication and security patterns for web applications, covering JWT, OAuth2, RBAC, MFA, and API security.
api-spectral
aiskillstore
Validates API specifications (OpenAPI, AsyncAPI) against security best practices, OWASP API Security Top 10, and organizational standards to detect vulnerabilities and ensure compliance.
code-reviewer
aiskillstore
Automates code review to identify security vulnerabilities, code quality issues, and adherence to best practices, enhancing software security and maintainability.
gdpr-data-handling
aiskillstore
Enables GDPR-compliant data handling with consent management, data subject rights, and privacy by design for EU personal data systems.
crack-hashcat
aiskillstore
Tool for authorized password recovery and hash cracking with multiple cryptographic algorithm support.
detection-sigma
aiskillstore
Creates and manages vendor-agnostic security detection rules using Sigma for SIEM platforms, threat hunting, and MITRE ATT&CK mapping.
coordinator
aiskillstore
Autonomously coordinates penetration testing using ReAct methodology, handling reconnaissance, exploitation, and privilege escalation to capture user and root flags.
security-patterns
aiskillstore
Provides OWASP-based security patterns and guidelines to prevent common vulnerabilities like XSS, SQL injection, and CSRF.
sast-horusec
aiskillstore
Multi-language SAST scanner detecting security vulnerabilities and exposed secrets in code and git history with severity classification.
security-audit
aiskillstore
Detects common security vulnerabilities including OWASP patterns, SQL injection, and shell injection in framework-agnostic code.
data-privacy-compliance
aiskillstore
Specializes in implementing data privacy controls and ensuring compliance with GDPR, CCPA, HIPAA, and international data protection laws through privacy-by-design and data minimization.
pitfalls-security
aiskillstore
Provides security patterns to avoid common pitfalls in session keys, caching, logging, and environment variables for secure implementation.
skill-name
aiskillstore
Provides SAST vulnerability analysis and remediation guidance using Semgrep and security standards. Use when scanning code for security issues.
azure-role-selector
aiskillstore
Guides users in selecting the appropriate Azure role for least privilege access based on required permissions.
binary-re-static-analysis
aiskillstore
Performs static binary analysis including disassembly, decompilation, and control flow graph generation using radare2 and Ghidra.