4. Security & Compliance
Found 3608 skills
plutonium-policy
radioactive-labs
Manages resource authorization policies with attribute-based permissions and scoping for secure access control.
dojo-world
dojoengine
Configures world ownership, authorization policies, and resource permissions for secure access control management.
dojo-review
dojoengine
Audits Dojo code for security vulnerabilities, best practices, and optimization opportunities to ensure secure and robust deployments.
security-convex
IgorWarzocha
Audits Convex applications for security vulnerabilities including missing auth checks, IDOR risks, and data leaks in queries, mutations, and subscriptions.
security-nextjs
IgorWarzocha
Audits Next.js applications for security vulnerabilities including exposed environment variables, missing authentication in Server Actions, and middleware configuration.
security-django
IgorWarzocha
Audits Django applications for security vulnerabilities by checking settings, middleware, and authentication patterns including SECRET_KEY, CSRF, and auth decorators.
security-vite
IgorWarzocha
Audits Vite security patterns for environment variables, build secrets, and dev server configurations in SPAs and development environments.
security-bun
IgorWarzocha
Audits Bun runtime security patterns, identifying vulnerabilities like injection flaws and insecure configurations in Bun applications.
security-fastapi
IgorWarzocha
Audits FastAPI applications for security vulnerabilities in dependencies, middleware, CORS, and authentication configurations.
security-docker
IgorWarzocha
Audits Docker container security by checking for secrets in layers, exposed ports, non-root users, and privileged configurations in Dockerfiles and docker-compose.yml.
security-secrets
IgorWarzocha
Scans code repositories and history for high-signal secrets including AWS keys and tokens to prevent exposure during security audits.
security-express
IgorWarzocha
Audits Express.js applications for security vulnerabilities in middleware, routes, and configuration settings like Helmet.js, CORS, and authentication.
security-ai-keys
IgorWarzocha
Scans code and configurations for exposed AI API keys (e.g., OpenAI, Anthropic) and verifies proper redaction in logs and integrations.
security-auditor
jason0x43
Continuous security vulnerability scanning for OWASP Top 10, SQL injection, XSS, and secrets exposure. Triggers on file changes and security mentions.
equilateral-agents
Equilateral-AI
Provides 22 AI agents for automated security reviews, code quality analysis, compliance checks, and infrastructure validation with auto-activation.
verify
Mburdo
Scans code for security vulnerabilities using UBS before commits or when security-related keywords are mentioned.
troubleshooting-authentication
microsoft-foundry
Troubleshoots authentication issues including 401 errors, token problems, and MSAL configuration for Entra ID and JWT.
security-code-review
kousen
Performs code audits to detect security flaws and provides recommendations for secure coding practices.
python-security-scan
sugarforever
Scans Python web applications for OWASP Top 10 vulnerabilities and dependency CVEs, generating actionable security reports.
nextjs-security-scan
sugarforever
Scans Next.js and TypeScript/JavaScript projects for security vulnerabilities including OWASP Top 10, XSS, and hardcoded secrets, generating actionable reports.
grc-compliance
groeimetai
Assists with Governance, Risk, and Compliance (GRC) topics including SOX, GDPR, and ServiceNow GRC implementation.
security-operations
groeimetai
Manages security operations including incident response, vulnerability handling, threat analysis, and SIEM case management for security teams.
instance-security
groeimetai
Provides security best practices guidance for ServiceNow instances, including authentication, SSO, MFA, and protection against XSS/injection vulnerabilities.
acl-security
groeimetai
Manages ServiceNow access control lists (ACLs) and security configurations for role-based, row-level, and field-level security.