4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

security-scanning-security-dependencies

rmyndharis

68

Scans project dependencies for vulnerabilities, generates SBOMs, and provides remediation recommendations for supply chain security risks.

Dependency Scanning
SBOM
Supply Chain Security
4. Security & Compliance

threat-mitigation-mapping

rmyndharis

68

Maps identified threats to security controls for prioritizing investments, remediation planning, and validating control effectiveness.

Threat Mapping
Security Controls
Risk Mitigation
4. Security & Compliance

security-scanning-security-hardening

rmyndharis

68

Coordinates multi-layer security scanning and hardening across applications, infrastructure, and compliance controls to strengthen security posture.

Security Scanning
Hardening
Compliance
4. Security & Compliance

mobile-security-coder

rmyndharis

68

Provides secure mobile coding practices including input validation, WebView security, and mobile-specific security patterns for implementation and code reviews.

Input Validation
WebView Security
Mobile Security Patterns
4. Security & Compliance

solidity-security

rmyndharis

68

Provides security best practices for Solidity smart contracts to prevent vulnerabilities and ensure secure implementation.

Solidity
Smart Contracts
Security Auditing
4. Security & Compliance

sast-configuration

rmyndharis

68

Configures Static Application Security Testing (SAST) tools for automated vulnerability detection in application code, enhancing DevSecOps security scanning.

SAST
Vulnerability Detection
DevSecOps
4. Security & Compliance

k8s-security-policies

rmyndharis

68

Implements Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production cluster security.

Kubernetes
NetworkPolicy
RBAC
4. Security & Compliance

frontend-security-coder

rmyndharis

68

Provides secure frontend coding guidance to prevent XSS and ensure output sanitization in client-side applications.

XSS
Sanitization
Client-Side
4. Security & Compliance

firmware-analyst

rmyndharis

68

Expert firmware security analysis for audits, vulnerability research, and penetration testing in embedded systems and IoT devices.

Firmware Analysis
IoT Security
Reverse Engineering
4. Security & Compliance

attack-tree-construction

rmyndharis

68

Builds visual attack trees to map threat scenarios, identify security gaps, and communicate risks to stakeholders.

Attack Trees
Threat Modeling
Risk Assessment
4. Security & Compliance

security-auditor

rmyndharis

68

Conducts security audits, vulnerability assessments, and ensures compliance with OWASP, GDPR, HIPAA, and SOC2 frameworks.

OWASP
DevSecOps
GDPR
4. Security & Compliance

stride-analysis-patterns

rmyndharis

68

Applies STRIDE methodology for systematic threat identification in security analysis and threat modeling sessions.

STRIDE
Threat Modeling
4. Security & Compliance

dependency-management-deps-audit

rmyndharis

68

Scans project dependencies for security vulnerabilities, license issues, and outdated packages, providing actionable remediation strategies.

Dependency Audit
Vulnerability Scanning
License Compliance
4. Security & Compliance

pci-compliance

rmyndharis

68

Enables secure handling of payment card data by implementing PCI DSS compliance requirements for payment systems and data security.

PCI DSS
Payment Security
Compliance
4. Security & Compliance

security-compliance-compliance-check

rmyndharis

68

Performs compliance audits and provides implementation guidance for regulatory standards including GDPR, HIPAA, SOC2, and PCI-DSS.

GDPR
HIPAA
SOC2
4. Security & Compliance

binary-analysis-patterns

rmyndharis

68

Provides advanced static analysis techniques for disassembly, decompilation, and control flow analysis to understand compiled binaries and detect security patterns.

Disassembly
Decompilation
Static Analysis
4. Security & Compliance

backend-security-coder

rmyndharis

68

Specializes in implementing secure backend practices including input validation, authentication, and API security for robust applications.

Input Validation
Authentication
API Security
4. Security & Compliance

threat-modeling-expert

rmyndharis

68

Expert in threat modeling methodologies including STRIDE and PASTA for security architecture reviews, risk assessment, and secure design planning.

STRIDE
PASTA
Attack Trees
4. Security & Compliance

protocol-reverse-engineering

rmyndharis

68

Analyzes network protocols via packet dissection and documentation to understand proprietary communication, debug issues, and identify security vulnerabilities.

Packet Analysis
Protocol Dissection
Network Security
4. Security & Compliance

wcag-audit-patterns

rmyndharis

68

Conducts automated and manual WCAG 2.2 accessibility audits with remediation guidance for website compliance.

WCAG 2.2
Accessibility Audit
Remediation
4. Security & Compliance

malware-analyst

rmyndharis

68

Provides defensive malware analysis, threat intelligence, and incident response capabilities including sandbox and behavioral analysis.

Sandbox Analysis
Behavioral Analysis
IOC Extraction
4. Security & Compliance

security-scanning-security-sast

rmyndharis

68

Performs static code analysis to detect security vulnerabilities in source code across multiple programming languages and frameworks.

SAST
Static Code Analysis
Vulnerability Scanning
4. Security & Compliance

codebase-cleanup-deps-audit

rmyndharis

68

Analyzes project dependencies for vulnerabilities, license issues, and outdated packages, providing actionable security remediation strategies.

Dependency Scanning
Vulnerability Scanning
License Compliance
4. Security & Compliance

security-requirement-extraction

rmyndharis

68

Derives security requirements from threat models and business context to generate security user stories and test cases.

Threat Modeling
Security Requirements
4. Security & Compliance
PreviousPage 35 of 151 PageNext