4. Security & Compliance
Found 3608 skills
anti-reversing-techniques
rmyndharis
Analyzes and bypasses anti-reversing techniques, obfuscation, and anti-debugging mechanisms for authorized security analysis of protected binaries.
reverse-engineer
rmyndharis
Expert reverse engineer for binary analysis, disassembly, and vulnerability research using industry tools to analyze executables and uncover security flaws.
mtls-configuration
rmyndharis
Configures mutual TLS (mTLS) for zero-trust service-to-service communication, ensuring certificate-based authentication and encryption.
frontend-mobile-security-xss-scan
rmyndharis
Analyzes React, Vue, Angular, and vanilla JS code for XSS vulnerabilities and provides prevention strategies.
screen-reader-testing
rmyndharis
Tests web applications for screen reader compatibility (VoiceOver, NVDA, JAWS) to ensure accessibility compliance.
accessibility-testing
conorluddy
Validates iOS app accessibility against WCAG 2.1 standards through automated testing, VoiceOver compatibility checks, and semantic analysis.
security-audit
mswell
Conducts comprehensive security code audits using STRIDE threat modeling, code review, and vulnerability assessment to identify exploitable security bugs for bug bounty contexts.
mobile-security-expert
s7safe
Provides a knowledge base of mobile security vulnerabilities from HackerOne reports, detailing Android and iOS app exploitation techniques for security researchers and auditors.
security
htlin222
Conducts security audits, vulnerability detection, and secure coding reviews to ensure OWASP compliance.
aws-sdk-java-v2-kms
giuseppe-trisciuoglio
Enables secure key management, encryption, decryption, and digital signing operations for Java 2.x applications using AWS KMS.
unit-test-security-authorization
giuseppe-trisciuoglio
Provides unit tests for Spring Security annotations to validate role-based access control and authorization policies.
spring-boot-security-jwt
giuseppe-trisciuoglio
Provides JWT authentication and RBAC authorization patterns for Spring Boot 3.5.x using Spring Security 6.x and JJWT.
aws-sdk-java-v2-secrets-manager
giuseppe-trisciuoglio
Integrates AWS Secrets Manager with Java applications for secure secret storage, rotation, and credential management.
auth-expert
cin12211
Expert in implementing secure authentication systems using JWT, OAuth 2.0, and RBAC for user access management and security enforcement.
accessibility-expert
cin12211
Ensures web accessibility compliance with WCAG 2.1/2.2 through ARIA implementation, keyboard navigation, and screen reader testing.
secure-code-guardian
Jeffallan
Enforces security best practices for authentication, input validation, and OWASP Top 10 vulnerability prevention in code.
security-reviewer
Jeffallan
Conducts security audits, code vulnerability reviews, and infrastructure security assessments using SAST, penetration testing, and DevSecOps practices.
database-schema-validator
rominirani
Validates SQL database schema files against internal safety and naming policies to ensure compliance.
bmad-security-review
bacoco
Conducts structured security reviews to harden software designs and implementations against vulnerabilities.
php-security-patterns
TheBushidoCollective
Provides essential PHP security patterns including input validation, SQL injection prevention, XSS protection, and CSRF tokens for secure application development.
sip-authentication-security
TheBushidoCollective
Enables implementation of authentication, encryption, and security mechanisms for SIP servers, clients, and proxies.
kubernetes-security
TheBushidoCollective
Enables implementation of Kubernetes security best practices including RBAC, Pod Security Policies, and Network Policies for secure cluster management.
fnox-security-best-practices
TheBushidoCollective
Provides secure secrets management best practices including encryption, key management, and access control implementation with Fnox.
fnox-providers
TheBushidoCollective
Configures Fnox providers for secure encryption and secret storage, supporting age encryption, cloud services (AWS, Azure, GCP), and password managers.