4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

security-reactnative

TheBeardedBearSAS

71

Provides security best practices for React Native applications, including authentication implementation and code hardening guidance.

React Native
Authentication
Code Hardening
4. Security & Compliance

security-react

TheBeardedBearSAS

71

Provides security reviews, authentication implementation, and code hardening for React applications.

React
Authentication
Security Auditing
4. Security & Compliance

security-flutter

TheBeardedBearSAS

71

Provides security review, authentication implementation, and code hardening for Flutter applications.

Flutter
Authentication
Code Hardening
4. Security & Compliance

security-flutter

TheBeardedBearSAS

71

Provides security review, authentication implementation, and code hardening for Flutter applications.

Flutter
Authentication
Code Hardening
4. Security & Compliance

multitenant

TheBeardedBearSAS

71

Enforces data isolation and security protocols in multitenant applications to prevent cross-tenant data exposure and ensure compliance.

Multitenant
Data Isolation
Security Compliance
4. Security & Compliance

security-reactnative

TheBeardedBearSAS

71

Provides security best practices for React Native, covering authentication implementation and code hardening for secure mobile applications.

React Native
Authentication
Code Hardening
4. Security & Compliance

security-symfony

TheBeardedBearSAS

71

Provides security review and hardening utilities for Symfony applications, ensuring GDPR compliance and secure authentication implementation.

Symfony
GDPR
Authentication
4. Security & Compliance

security-react

TheBeardedBearSAS

71

Provides security utilities for React applications, including authentication implementation and code hardening to prevent vulnerabilities.

React
Authentication
Code Hardening
4. Security & Compliance

security-react

TheBeardedBearSAS

71

Security utilities for React applications: code review, authentication implementation, and security hardening.

React
Authentication
Security Hardening
4. Security & Compliance

security-assessment

jmagly

70

Executes threat modeling, vulnerability scanning, and security control validation to identify and mitigate security risks.

Threat Modeling
Vulnerability Scanning
Security Controls
4. Security & Compliance

ringregulatory-templates

LerianStudio

69

Orchestrates a three-gate regulatory compliance workflow for BACEN and RFB, managing analysis, validation, and template generation.

BACEN
RFB
Regulatory Gate
4. Security & Compliance

ringusing-finops-team

LerianStudio

69

Provides two FinOps agents for Brazilian financial regulatory compliance, handling analysis and template generation for BACEN, RFB, and Open Banking requirements.

BACEN
RFB
Open Banking
4. Security & Compliance

ringregulatory-templates-gate1

LerianStudio

69

Conducts regulatory compliance analysis and field mapping from template specifications for Gate 1.

Regulatory Compliance
Field Mapping
Template Specifications
4. Security & Compliance

ringregulatory-templates-gate3

LerianStudio

69

Generates a complete .tpl regulatory template file with validated mappings from Gates 1-2 for compliance documentation.

Regulatory Templates
Gate Process
Validated Mappings
4. Security & Compliance

ringregulatory-templates-setup

LerianStudio

69

Initializes regulatory compliance workflows by selecting templates and configuring context for a 3-gate process.

Regulatory Compliance
Template Selection
3-Gate Workflow
4. Security & Compliance

ops-security-audit

LerianStudio

69

Provides a structured workflow for infrastructure security audits including compliance validation, vulnerability assessment, and security posture review.

Security Audit
Compliance
Vulnerability Assessment
4. Security & Compliance

ringregulatory-templates-gate2

LerianStudio

69

Validates uncertain data mappings from Gate 1 and confirms field specifications through testing to ensure regulatory compliance.

Regulatory Compliance
Data Mapping
Field Specification
4. Security & Compliance

small-skill

feiskyer

69

Provides basic token content for testing authentication security and token validation in development environments.

Token Testing
Authentication
Security Validation
4. Security & Compliance

medium-skill

feiskyer

69

Performs security validation of authentication tokens, including expiration, signature, and integrity checks.

JWT
Token Validation
Security Testing
4. Security & Compliance

accessibility-compliance-accessibility-audit

rmyndharis

68

Conducts WCAG accessibility audits, identifies barriers, and provides remediation guidance for inclusive digital experiences.

WCAG
Accessibility Audit
Inclusive Design
4. Security & Compliance

gdpr-data-handling

rmyndharis

68

Enables GDPR-compliant data handling with consent management, data subject rights, and privacy by design for EU personal data systems.

GDPR
Consent Management
Data Subject Rights
4. Security & Compliance

auth-implementation-patterns

rmyndharis

68

Provides secure authentication and authorization patterns including JWT, OAuth2, and RBAC for building robust access control systems.

JWT
OAuth2
RBAC
4. Security & Compliance

memory-forensics

rmyndharis

68

Analyzes memory dumps for incident response and malware analysis using Volatility framework.

Volatility
Memory Dumps
Malware Analysis
4. Security & Compliance

incident-response-incident-response

rmyndharis

68

Assists in managing and responding to security incidents through structured workflows and documentation.

Incident Response
Security Operations
Incident Management
4. Security & Compliance
PreviousPage 34 of 151 PageNext