4. Security & Compliance
Found 3608 skills
security-audit
aiskillstore
Conducts security audits, vulnerability assessments, and OWASP compliance reviews to identify and report security risks in code.
dependency-audit-assistant
aiskillstore
Audits package dependencies for security vulnerabilities, outdated versions, and license compliance to ensure safe and legally compliant software releases.
special-chars-skill
maxvaega
Validates input security by testing special characters and injection patterns to prevent vulnerabilities.
file-reference-skill
maxvaega
Securely resolves file references, preventing path traversal and ensuring safe access to supporting files.
smart-contract-security-review
scalus3
Conducts security audits on Cardano smart contracts, identifying vulnerabilities like redirect attacks and integer overflow before deployment.
azure-role-selector
microsoft
Guides users in selecting the appropriate Azure role for least privilege access, ensuring minimal permissions required for desired tasks.
threat-hunting
korallis
Proactively identifies security threats, vulnerabilities, and suspicious patterns in applications and infrastructure to prevent breaches and enhance security posture.
security-patterns
korallis
Provides security patterns to mitigate OWASP Top 10 vulnerabilities including XSS, CSRF, and SQL injection in application development.
secure-coding
baz-scm
Guides developers in implementing secure coding practices to prevent vulnerabilities and safeguard user data throughout the development lifecycle.
skill-judge
shareAI-lab
Evaluates Agent Skill design quality against official specifications, providing multi-dimensional scoring and actionable improvement suggestions for SKILL.md files.
security-practices
eser
Provides essential security practices for sensitive code, covering secrets management, input validation, SSRF prevention, and production hardening.
reviewing-security
ryuichi1208
Reviews API security against OWASP Top 10 and Rust best practices, detecting vulnerabilities in authentication, authorization, and code audits.
waf-bypass-hunter
HacktronAI
Exploits parser discrepancies between Coraza WAF (Go) and Next.js 16 backend (Node.js) to bypass web application firewall protections.
patch-diff-analyzer
HacktronAI
Analyzes compiled binaries (JARs, DLLs) to compare versions, identify security fixes, and evaluate patch content for vulnerability assessment.
ctf-solver
HacktronAI
Automates solving cybersecurity Capture The Flag challenges by analyzing code and environments to extract flags.
secret-scanner
Afaneor
Scans code for exposed secrets like API keys and passwords to prevent accidental commits to version control.
security-reactnative
TheBeardedBearSAS
Provides security best practices for React Native, including authentication implementation and code hardening.
security
TheBeardedBearSAS
Enables security reviews, authentication implementation, and code hardening for secure application development.
security-react
TheBeardedBearSAS
Provides security utilities for React applications, including authentication implementation and code hardening.
security-flutter
TheBeardedBearSAS
Provides security review, authentication implementation, and code hardening for Flutter applications.
multitenant
TheBeardedBearSAS
Enforces security and isolation rules to prevent data leakage between tenants in multitenant applications.
security-symfony
TheBeardedBearSAS
Provides security review and hardening utilities for Symfony applications, emphasizing authentication and GDPR compliance.
security-flutter
TheBeardedBearSAS
Provides security utilities for Flutter applications, including authentication implementation and code hardening.
security-symfony
TheBeardedBearSAS
Provides security review, authentication implementation, and code hardening for Symfony applications in compliance with GDPR.