4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

dependency-auditor

aiskillstore

102

Automates identification of known vulnerabilities in project dependencies to enhance security posture.

Dependency Scanning
Vulnerability Scanning
4. Security & Compliance

when-configuring-sandbox-security-use-sandbox-configurator

aiskillstore

102

Configures sandbox security with file system and network isolation boundaries, access controls, and resource limits for safe code execution.

Sandbox Security
File System Isolation
Network Isolation
4. Security & Compliance

cultural-review

aiskillstore

102

Provides guidance for reviewing code, features, and content to ensure cultural sensitivity and compliance with Indigenous data sovereignty standards.

Indigenous Data Sovereignty
Cultural Sensitivity
Compliance Review
4. Security & Compliance

binary-re-triage

aiskillstore

102

Quickly analyzes unknown binaries (ELF, executables, firmware) for architecture, ABI, dependencies, and strings using rabin2.

rabin2
ELF
binary analysis
4. Security & Compliance

binary-re

aiskillstore

102

Analyzes binaries, executables, and bytecode through reverse engineering, disassembly, and decompilation to assess security and functionality.

Reverse Engineering
Disassembly
ELF
4. Security & Compliance

attack-tree-construction

aiskillstore

102

Constructs visual attack trees to map threat scenarios, identify security vulnerabilities, and communicate risks to stakeholders.

Attack Trees
Threat Modeling
4. Security & Compliance

security-checklist

aiskillstore

102

Provides OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines to secure applications against common vulnerabilities.

OWASP
Authentication
Input Validation
4. Security & Compliance

slb

aiskillstore

102

Enforces two-person approval for destructive commands in multi-agent workflows with risk-tiered classification and command hash binding via Go CLI.

Two-person rule
Command hash binding
Go CLI
4. Security & Compliance

api-mitmproxy

aiskillstore

102

Interactive HTTPS proxy for API security testing, enabling traffic interception, modification, and replay for vulnerability assessment.

mitmproxy
API Security
Traffic Interception
4. Security & Compliance

network-netcat

aiskillstore

102

Network utility for TCP/UDP data transfer, port scanning, and authorized penetration testing including reverse shells.

netcat
TCP
UDP
4. Security & Compliance

auth-analyzer

aiskillstore

102

Analyzes authentication and authorization patterns to identify security vulnerabilities in application design.

Authentication
Authorization
Security Audit
4. Security & Compliance

verification-protocol

aiskillstore

102

Enables independent verification of task completion, eliminating self-attestation to enhance reliability and trust in process outcomes.

Independent Verification
Self-Attestation
Compliance
4. Security & Compliance

secret-scanner

aiskillstore

102

Scans code repositories to identify and alert on accidentally committed secrets, credentials, and sensitive data.

Secret Scanning
Git
Credentials
4. Security & Compliance

webapp-nikto

aiskillstore

102

Scans web servers for vulnerabilities, misconfigurations, and outdated software to ensure security compliance and hardening.

Nikto
Vulnerability Scanning
Web Security
4. Security & Compliance

ir-velociraptor

aiskillstore

102

Enables endpoint forensic investigations, threat hunting, and incident response using Velociraptor Query Language (VQL) for scalable security analysis.

Velociraptor
VQL
Endpoint Forensics
4. Security & Compliance

iot-uart-console-picocom

aiskillstore

102

Enables UART console interaction with IoT devices using picocom for penetration testing, including device enumeration and vulnerability discovery.

picocom
UART
IoT pentesting
4. Security & Compliance

security-audit

aiskillstore

102

Performs security audits on command execution, tool permissions, and API key handling to identify vulnerabilities before production deployment.

Code Auditing
API Key Handling
Vulnerability Assessment
4. Security & Compliance

sandbox-configurator

aiskillstore

102

Enforces file system and network isolation boundaries for Claude Code sandboxes to enhance security and prevent unauthorized access.

Sandbox Security
File System Isolation
Network Isolation
4. Security & Compliance

sharepoint-audit

aiskillstore

102

Runs a local SharePoint audit by verifying dependencies, executing PowerShell with certificate auth, parsing results, and generating Markdown/HTML reports.

SharePoint
PowerShell
Certificate Authentication
4. Security & Compliance

security-audit

aiskillstore

102

Performs security audits on code, architecture, and infrastructure, including threat modeling and security reviews of pull requests.

Security Audit
Threat Modeling
Pull Request
4. Security & Compliance

reconnaissance-knowledge

aiskillstore

102

Provides structured methodologies for network reconnaissance, port scanning, service fingerprinting, and vulnerability identification with best practices for data collection.

Port Scanning
Service Fingerprinting
Vulnerability Identification
4. Security & Compliance

iac-checkov

aiskillstore

102

Scans IaC files for security misconfigurations and compliance violations against standards like CIS and PCI-DSS.

Terraform
CIS
CloudFormation
4. Security & Compliance

dast-nuclei

aiskillstore

102

Performs rapid vulnerability scanning using Nuclei templates for web applications, APIs, and infrastructure, covering CVEs and OWASP Top 10.

Nuclei
Vulnerability Scanning
OWASP
4. Security & Compliance

policy-opa

aiskillstore

102

Enforces security and compliance policies across infrastructure and applications using Open Policy Agent (OPA) for frameworks like GDPR, HIPAA, and SOC2.

OPA
Rego
Compliance
4. Security & Compliance
PreviousPage 31 of 151 PageNext