4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

security-headers

aiskillstore

102

Validates and implements HTTP security headers to enhance web application security against common vulnerabilities.

CSP
HSTS
4. Security & Compliance

security

aiskillstore

102

Performs security validation, vulnerability scanning, and compliance checks to ensure system security and regulatory adherence.

Vulnerability Scanning
Compliance
Security Validation
4. Security & Compliance

fiduciary-duty-negligence

aiskillstore

102

Processes administrative cases for Crown fiduciary duty negligence, including fund mismanagement and reserve land protection failures.

Fiduciary Duty
Regulatory Compliance
Reserve Lands
4. Security & Compliance

vibe-security

aiskillstore

102

Automated security analysis tool detecting critical vulnerabilities like SQL injection, XSS, and CSRF across multiple programming languages and frameworks.

SQL injection
XSS
Code auditing
4. Security & Compliance

pentest-coordinator

aiskillstore

102

Autonomously orchestrates penetration testing workflows including reconnaissance, exploitation, and privilege escalation until target flags are captured.

ReAct
PenTest
Recon
4. Security & Compliance

constitution-guardian

aiskillstore

102

Real-time constitutional compliance checker for development documents, blocking insecure practices like hardcoded secrets and incomplete implementations during editing.

Hardcoded Secrets
Security Compliance
Code Auditing
4. Security & Compliance

traffic-analysis

aiskillstore

102

Analyzes network traffic patterns using DPI to identify applications, monitor bandwidth, and optimize traffic management for security and efficiency.

DPI
Traffic Classification
Bandwidth Monitoring
4. Security & Compliance

binary-analysis

aiskillstore

102

Analyzes binary files (exe, dll, etc.) for malware, extracts technical details, and provides threat assessment. Triggered by safety queries.

Malware Analysis
Binary Analysis
Decompilation
4. Security & Compliance

binary-re-tool-setup

aiskillstore

102

Provides installation and configuration guides for reverse engineering tools including radare2, Ghidra, GDB, and QEMU to support security analysis and malware research.

radare2
Ghidra
GDB
4. Security & Compliance

dcg

aiskillstore

102

High-performance Rust hook that blocks dangerous commands before execution using SIMD acceleration and whitelist-first architecture for agent workflow safety.

Rust
SIMD
Whitelist
4. Security & Compliance

web-accessibility

aiskillstore

102

Conducts WCAG 2.1/2.2 compliance audits, screen reader testing, and keyboard navigation validation for accessible web design.

WCAG
Screen Reader
Keyboard Navigation
4. Security & Compliance

firebase-development-validate

aiskillstore

102

Reviews Firebase code against security best practices, validating configuration, rules, and architecture for potential vulnerabilities.

Firebase
Security Review
Firebase Rules
4. Security & Compliance

incident-runbook-templates

aiskillstore

102

Generates structured incident response runbooks with step-by-step procedures, escalation paths, and recovery actions for security incident management.

Incident Response
Runbook
Security Operations
4. Security & Compliance

1password-credential-lookup

aiskillstore

102

Securely retrieves website credentials from 1Password using URL-based lookup to prevent insecure practices.

1Password
Credential Management
URL-based Lookup
4. Security & Compliance

sca-blackduck

aiskillstore

102

Performs Software Composition Analysis (SCA) to identify open source vulnerabilities, license risks, and supply chain threats with CVE/CWE mapping for security and compliance.

SCA
CVE
License Compliance
4. Security & Compliance

network-security-setup

aiskillstore

102

Configures network isolation, trusted domains, and access policies in Claude Code sandbox for secure environment management.

Network Isolation
Access Policies
Trusted Domains
4. Security & Compliance

sbom-syft

aiskillstore

102

Generates Software Bill of Materials (SBOM) for container images and applications, enabling vulnerability scanning, license compliance, and supply chain security analysis.

Syft
SBOM
CycloneDX
4. Security & Compliance

when-setting-network-security-use-network-security-setup

aiskillstore

102

Configures network isolation, trusted domains, and access policies in Claude Code sandbox for secure network communication.

Network Isolation
Access Policies
Environment Variables
4. Security & Compliance

binary-re-dynamic-analysis

aiskillstore

102

Performs dynamic binary analysis using QEMU, GDB, Frida, and strace for runtime behavior observation, syscall tracing, and memory inspection.

QEMU
GDB
Frida
4. Security & Compliance

threat-mitigation-mapping

aiskillstore

102

Maps security threats to appropriate controls and mitigations for prioritizing investments, creating remediation plans, and validating control effectiveness.

Threat Mapping
Security Controls
Risk Mitigation
4. Security & Compliance

analysis-tshark

aiskillstore

102

Analyzes network traffic for security incidents, malware detection, and forensic investigations using tshark command-line interface.

tshark
network forensics
packet capture
4. Security & Compliance

pentest-metasploit

aiskillstore

102

Provides penetration testing capabilities using Metasploit Framework for authorized security assessments and vulnerability validation.

Metasploit
Penetration Testing
Exploit Development
4. Security & Compliance

forensics-osquery

aiskillstore

102

Enables forensic investigation and threat hunting by querying operating systems via SQL for security incident response and evidence collection.

osquery
SQL
Threat Hunting
4. Security & Compliance

security-fundamentals

aiskillstore

102

Enforces OWASP Top 10 security best practices during code reviews for authentication, authorization, and data exposure.

OWASP
Authentication
Authorization
4. Security & Compliance
PreviousPage 32 of 151 PageNext