4. Security & Compliance
Found 3608 skills
security-scanning-security-dependencies
rmyndharis
Scans project dependencies for vulnerabilities, generates SBOMs, and provides remediation recommendations for supply chain security risks.
threat-mitigation-mapping
rmyndharis
Maps identified threats to security controls for prioritizing investments, remediation planning, and validating control effectiveness.
security-scanning-security-hardening
rmyndharis
Coordinates multi-layer security scanning and hardening across applications, infrastructure, and compliance controls to strengthen security posture.
mobile-security-coder
rmyndharis
Provides secure mobile coding practices including input validation, WebView security, and mobile-specific security patterns for implementation and code reviews.
solidity-security
rmyndharis
Provides security best practices for Solidity smart contracts to prevent vulnerabilities and ensure secure implementation.
sast-configuration
rmyndharis
Configures Static Application Security Testing (SAST) tools for automated vulnerability detection in application code, enhancing DevSecOps security scanning.
k8s-security-policies
rmyndharis
Implements Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production cluster security.
frontend-security-coder
rmyndharis
Provides secure frontend coding guidance to prevent XSS and ensure output sanitization in client-side applications.
firmware-analyst
rmyndharis
Expert firmware security analysis for audits, vulnerability research, and penetration testing in embedded systems and IoT devices.
attack-tree-construction
rmyndharis
Builds visual attack trees to map threat scenarios, identify security gaps, and communicate risks to stakeholders.
security-auditor
rmyndharis
Conducts security audits, vulnerability assessments, and ensures compliance with OWASP, GDPR, HIPAA, and SOC2 frameworks.
stride-analysis-patterns
rmyndharis
Applies STRIDE methodology for systematic threat identification in security analysis and threat modeling sessions.
dependency-management-deps-audit
rmyndharis
Scans project dependencies for security vulnerabilities, license issues, and outdated packages, providing actionable remediation strategies.
pci-compliance
rmyndharis
Enables secure handling of payment card data by implementing PCI DSS compliance requirements for payment systems and data security.
security-compliance-compliance-check
rmyndharis
Performs compliance audits and provides implementation guidance for regulatory standards including GDPR, HIPAA, SOC2, and PCI-DSS.
binary-analysis-patterns
rmyndharis
Provides advanced static analysis techniques for disassembly, decompilation, and control flow analysis to understand compiled binaries and detect security patterns.
backend-security-coder
rmyndharis
Specializes in implementing secure backend practices including input validation, authentication, and API security for robust applications.
threat-modeling-expert
rmyndharis
Expert in threat modeling methodologies including STRIDE and PASTA for security architecture reviews, risk assessment, and secure design planning.
protocol-reverse-engineering
rmyndharis
Analyzes network protocols via packet dissection and documentation to understand proprietary communication, debug issues, and identify security vulnerabilities.
wcag-audit-patterns
rmyndharis
Conducts automated and manual WCAG 2.2 accessibility audits with remediation guidance for website compliance.
malware-analyst
rmyndharis
Provides defensive malware analysis, threat intelligence, and incident response capabilities including sandbox and behavioral analysis.
security-scanning-security-sast
rmyndharis
Performs static code analysis to detect security vulnerabilities in source code across multiple programming languages and frameworks.
codebase-cleanup-deps-audit
rmyndharis
Analyzes project dependencies for vulnerabilities, license issues, and outdated packages, providing actionable security remediation strategies.
security-requirement-extraction
rmyndharis
Derives security requirements from threat models and business context to generate security user stories and test cases.