4. Security & Compliance
Found 3608 skills
security-headers
aiskillstore
Validates and implements HTTP security headers to enhance web application security against common vulnerabilities.
security
aiskillstore
Performs security validation, vulnerability scanning, and compliance checks to ensure system security and regulatory adherence.
fiduciary-duty-negligence
aiskillstore
Processes administrative cases for Crown fiduciary duty negligence, including fund mismanagement and reserve land protection failures.
vibe-security
aiskillstore
Automated security analysis tool detecting critical vulnerabilities like SQL injection, XSS, and CSRF across multiple programming languages and frameworks.
pentest-coordinator
aiskillstore
Autonomously orchestrates penetration testing workflows including reconnaissance, exploitation, and privilege escalation until target flags are captured.
constitution-guardian
aiskillstore
Real-time constitutional compliance checker for development documents, blocking insecure practices like hardcoded secrets and incomplete implementations during editing.
traffic-analysis
aiskillstore
Analyzes network traffic patterns using DPI to identify applications, monitor bandwidth, and optimize traffic management for security and efficiency.
binary-analysis
aiskillstore
Analyzes binary files (exe, dll, etc.) for malware, extracts technical details, and provides threat assessment. Triggered by safety queries.
binary-re-tool-setup
aiskillstore
Provides installation and configuration guides for reverse engineering tools including radare2, Ghidra, GDB, and QEMU to support security analysis and malware research.
dcg
aiskillstore
High-performance Rust hook that blocks dangerous commands before execution using SIMD acceleration and whitelist-first architecture for agent workflow safety.
web-accessibility
aiskillstore
Conducts WCAG 2.1/2.2 compliance audits, screen reader testing, and keyboard navigation validation for accessible web design.
firebase-development-validate
aiskillstore
Reviews Firebase code against security best practices, validating configuration, rules, and architecture for potential vulnerabilities.
incident-runbook-templates
aiskillstore
Generates structured incident response runbooks with step-by-step procedures, escalation paths, and recovery actions for security incident management.
1password-credential-lookup
aiskillstore
Securely retrieves website credentials from 1Password using URL-based lookup to prevent insecure practices.
sca-blackduck
aiskillstore
Performs Software Composition Analysis (SCA) to identify open source vulnerabilities, license risks, and supply chain threats with CVE/CWE mapping for security and compliance.
network-security-setup
aiskillstore
Configures network isolation, trusted domains, and access policies in Claude Code sandbox for secure environment management.
sbom-syft
aiskillstore
Generates Software Bill of Materials (SBOM) for container images and applications, enabling vulnerability scanning, license compliance, and supply chain security analysis.
when-setting-network-security-use-network-security-setup
aiskillstore
Configures network isolation, trusted domains, and access policies in Claude Code sandbox for secure network communication.
binary-re-dynamic-analysis
aiskillstore
Performs dynamic binary analysis using QEMU, GDB, Frida, and strace for runtime behavior observation, syscall tracing, and memory inspection.
threat-mitigation-mapping
aiskillstore
Maps security threats to appropriate controls and mitigations for prioritizing investments, creating remediation plans, and validating control effectiveness.
analysis-tshark
aiskillstore
Analyzes network traffic for security incidents, malware detection, and forensic investigations using tshark command-line interface.
pentest-metasploit
aiskillstore
Provides penetration testing capabilities using Metasploit Framework for authorized security assessments and vulnerability validation.
forensics-osquery
aiskillstore
Enables forensic investigation and threat hunting by querying operating systems via SQL for security incident response and evidence collection.
security-fundamentals
aiskillstore
Enforces OWASP Top 10 security best practices during code reviews for authentication, authorization, and data exposure.