4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

configuring-better-auth

aiskillstore

102

Configures OAuth 2.1 and OIDC authentication with Better Auth, supporting SSO providers, Next.js clients, PKCE, and JWKS token verification.

OAuth 2.1
OIDC
JWKS
4. Security & Compliance

accessibility-auditor

aiskillstore

102

Audits websites for WCAG 2.1 AA/AAA compliance, ADA adherence, and assistive technology compatibility using ARIA and semantic HTML.

WCAG
ARIA
Semantic HTML
4. Security & Compliance

container-hadolint

aiskillstore

102

Performs security linting on Dockerfiles against CIS benchmarks, detecting misconfigurations and hardcoded secrets to enforce secure container image builds.

Dockerfile
Hadolint
CIS Benchmark
4. Security & Compliance

webapp-sqlmap

aiskillstore

102

Automates SQL injection vulnerability detection, exploitation, and data extraction for authorized web application security assessments.

SQL Injection
sqlmap
Penetration Testing
4. Security & Compliance

employment-contract-templates

aiskillstore

102

Creates legally compliant employment contracts, offer letters, and HR policies following labor regulations.

Employment Contracts
HR Compliance
Labor Regulations
4. Security & Compliance

security-guardian

aiskillstore

102

Provides application security expertise for vulnerability detection, code auditing, and secure development practices covering OWASP Top 10, authentication, and cryptography.

OWASP
Authentication
Cryptography
4. Security & Compliance

wcag-audit-patterns

aiskillstore

102

Conducts automated and manual WCAG 2.2 accessibility audits with remediation guidance for website compliance.

WCAG 2.2
Accessibility Audit
Remediation
4. Security & Compliance

claude-settings-audit

aiskillstore

102

Analyzes code repositories to recommend secure permissions settings for Claude Code, including read-only command allowances based on detected tech stack and project structure.

settings.json
monorepo
permissions
4. Security & Compliance

security-analyzer

aiskillstore

102

Comprehensive security vulnerability analysis for codebases, dependencies, containers, and IaC, with risk scoring and remediation plans.

CVE
Dependency Scanning
IaC Security
4. Security & Compliance

auth

aiskillstore

102

Framework-agnostic authentication and security patterns for web applications, covering JWT, OAuth2, RBAC, MFA, and API security.

JWT
OAuth2
RBAC
4. Security & Compliance

api-spectral

aiskillstore

102

Validates API specifications (OpenAPI, AsyncAPI) against security best practices, OWASP API Security Top 10, and organizational standards to detect vulnerabilities and ensure compliance.

OpenAPI
Spectral
OWASP
4. Security & Compliance

code-reviewer

aiskillstore

102

Automates code review to identify security vulnerabilities, code quality issues, and adherence to best practices, enhancing software security and maintainability.

Security Scanning
Code Quality
Static Analysis
4. Security & Compliance

gdpr-data-handling

aiskillstore

102

Enables GDPR-compliant data handling with consent management, data subject rights, and privacy by design for EU personal data systems.

GDPR
Consent Management
Data Subject Rights
4. Security & Compliance

crack-hashcat

aiskillstore

102

Tool for authorized password recovery and hash cracking with multiple cryptographic algorithm support.

Hashcat
Password Cracking
Cryptographic Hash
4. Security & Compliance

detection-sigma

aiskillstore

102

Creates and manages vendor-agnostic security detection rules using Sigma for SIEM platforms, threat hunting, and MITRE ATT&CK mapping.

Sigma
MITRE ATT&CK
SIEM
4. Security & Compliance

coordinator

aiskillstore

102

Autonomously coordinates penetration testing using ReAct methodology, handling reconnaissance, exploitation, and privilege escalation to capture user and root flags.

ReAct
Privilege Escalation
4. Security & Compliance

security-patterns

aiskillstore

102

Provides OWASP-based security patterns and guidelines to prevent common vulnerabilities like XSS, SQL injection, and CSRF.

OWASP
XSS
SQL Injection
4. Security & Compliance

sast-horusec

aiskillstore

102

Multi-language SAST scanner detecting security vulnerabilities and exposed secrets in code and git history with severity classification.

SAST
Horusec
Secret Detection
4. Security & Compliance

security-audit

aiskillstore

102

Detects common security vulnerabilities including OWASP patterns, SQL injection, and shell injection in framework-agnostic code.

OWASP
SQL Injection
Shell Injection
4. Security & Compliance

data-privacy-compliance

aiskillstore

102

Specializes in implementing data privacy controls and ensuring compliance with GDPR, CCPA, HIPAA, and international data protection laws through privacy-by-design and data minimization.

GDPR
CCPA
HIPAA
4. Security & Compliance

pitfalls-security

aiskillstore

102

Provides security patterns to avoid common pitfalls in session keys, caching, logging, and environment variables for secure implementation.

Session Keys
Environment Variables
Secrets
4. Security & Compliance

skill-name

aiskillstore

102

Provides SAST vulnerability analysis and remediation guidance using Semgrep and security standards. Use when scanning code for security issues.

SAST
Semgrep
OWASP
4. Security & Compliance

azure-role-selector

aiskillstore

102

Guides users in selecting the appropriate Azure role for least privilege access based on required permissions.

Azure
RBAC
Least Privilege
4. Security & Compliance

binary-re-static-analysis

aiskillstore

102

Performs static binary analysis including disassembly, decompilation, and control flow graph generation using radare2 and Ghidra.

radare2
Ghidra
static analysis
4. Security & Compliance
PreviousPage 30 of 151 PageNext