4. Security & Compliance
Found 3608 skills
dependency-auditor
aiskillstore
Automates identification of known vulnerabilities in project dependencies to enhance security posture.
when-configuring-sandbox-security-use-sandbox-configurator
aiskillstore
Configures sandbox security with file system and network isolation boundaries, access controls, and resource limits for safe code execution.
cultural-review
aiskillstore
Provides guidance for reviewing code, features, and content to ensure cultural sensitivity and compliance with Indigenous data sovereignty standards.
binary-re-triage
aiskillstore
Quickly analyzes unknown binaries (ELF, executables, firmware) for architecture, ABI, dependencies, and strings using rabin2.
binary-re
aiskillstore
Analyzes binaries, executables, and bytecode through reverse engineering, disassembly, and decompilation to assess security and functionality.
attack-tree-construction
aiskillstore
Constructs visual attack trees to map threat scenarios, identify security vulnerabilities, and communicate risks to stakeholders.
security-checklist
aiskillstore
Provides OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines to secure applications against common vulnerabilities.
slb
aiskillstore
Enforces two-person approval for destructive commands in multi-agent workflows with risk-tiered classification and command hash binding via Go CLI.
api-mitmproxy
aiskillstore
Interactive HTTPS proxy for API security testing, enabling traffic interception, modification, and replay for vulnerability assessment.
network-netcat
aiskillstore
Network utility for TCP/UDP data transfer, port scanning, and authorized penetration testing including reverse shells.
auth-analyzer
aiskillstore
Analyzes authentication and authorization patterns to identify security vulnerabilities in application design.
verification-protocol
aiskillstore
Enables independent verification of task completion, eliminating self-attestation to enhance reliability and trust in process outcomes.
secret-scanner
aiskillstore
Scans code repositories to identify and alert on accidentally committed secrets, credentials, and sensitive data.
webapp-nikto
aiskillstore
Scans web servers for vulnerabilities, misconfigurations, and outdated software to ensure security compliance and hardening.
ir-velociraptor
aiskillstore
Enables endpoint forensic investigations, threat hunting, and incident response using Velociraptor Query Language (VQL) for scalable security analysis.
iot-uart-console-picocom
aiskillstore
Enables UART console interaction with IoT devices using picocom for penetration testing, including device enumeration and vulnerability discovery.
security-audit
aiskillstore
Performs security audits on command execution, tool permissions, and API key handling to identify vulnerabilities before production deployment.
sandbox-configurator
aiskillstore
Enforces file system and network isolation boundaries for Claude Code sandboxes to enhance security and prevent unauthorized access.
sharepoint-audit
aiskillstore
Runs a local SharePoint audit by verifying dependencies, executing PowerShell with certificate auth, parsing results, and generating Markdown/HTML reports.
security-audit
aiskillstore
Performs security audits on code, architecture, and infrastructure, including threat modeling and security reviews of pull requests.
reconnaissance-knowledge
aiskillstore
Provides structured methodologies for network reconnaissance, port scanning, service fingerprinting, and vulnerability identification with best practices for data collection.
iac-checkov
aiskillstore
Scans IaC files for security misconfigurations and compliance violations against standards like CIS and PCI-DSS.
dast-nuclei
aiskillstore
Performs rapid vulnerability scanning using Nuclei templates for web applications, APIs, and infrastructure, covering CVEs and OWASP Top 10.
policy-opa
aiskillstore
Enforces security and compliance policies across infrastructure and applications using Open Policy Agent (OPA) for frameworks like GDPR, HIPAA, and SOC2.