4. Security & Compliance
Found 3608 skills
mapbox-token-security
mapbox
Provides security best practices for Mapbox access tokens, including scope management, URL restrictions, and rotation strategies.
pact-security-patterns
ProfSynapse
Provides security best practices and threat mitigation patterns for PACT framework development, covering authentication, data protection, and vulnerability review.
standard-security-auth
salavender
Specializes in implementing secure authentication mechanisms including JWT, cookie-based sessions, and MFA for web applications.
dependabot-security
bitsoex
Automates resolution of Dependabot security alerts in Java/Gradle projects through severity-based processing and CI validation.
security-review
bitsoex
Conducts security analysis on code changes, covering credential scanning, input validation, authentication checks, and dependency vulnerability assessment.
plaid-identity-expert
raintree-technology
Provides identity verification, KYC compliance, and fraud prevention services for account holder information retrieval including name and address.
api-security
jefflester
Enforces API security best practices to prevent OWASP Top 10 vulnerabilities including SQL injection and XSS.
ffuf-web-fuzzing
danielmiessler
Guides on using ffuf for web fuzzing in penetration testing, covering authenticated scans, auto-calibration, and result analysis.
fix-code-vulnerability
letta-ai
Guides developers in identifying and patching security vulnerabilities, including CWE-classified flaws and injection issues, to enhance code security.
openssl-selfsigned-cert
letta-ai
Generates self-signed SSL/TLS certificates using OpenSSL, including private keys, CSRs, and PEM files, with verification and common pitfalls.
filter-js-from-html
letta-ai
Removes JavaScript and XSS payloads from HTML while preserving original document structure for secure content handling.
git-leak-recovery
letta-ai
Guides recovery and secure removal of sensitive data from Git history after reset or rebase operations to prevent leaks.
vulnerable-secret
letta-ai
Guides extraction of secrets from protected binaries using static and dynamic analysis for security assessment and vulnerability discovery.
sanitize-git-repo
letta-ai
Removes sensitive credentials and secrets from Git repositories to prevent exposure and ensure security compliance.
git-leak-recovery
letta-ai
Recover and securely remove leaked secrets from Git repositories, including orphaned commits and unreachable objects, to prevent security breaches.
feal-linear-cryptanalysis
letta-ai
Guides linear cryptanalysis for FEAL cipher, enabling key recovery from known plaintext-ciphertext pairs via mathematical analysis.
fix-code-vulnerability
letta-ai
Provides guidance for identifying and fixing security vulnerabilities in code, including CVE/CWE remediation and common attack types like SQL injection and XSS.
crack-7z-hash
letta-ai
Guides cracking 7z archive password hashes using dictionary or brute-force methods for security testing and password recovery.
feal-differential-cryptanalysis
letta-ai
Guides implementation of differential cryptanalysis on FEAL and Feistel ciphers for key recovery and vulnerability exploitation in security challenges and CTF exercises.
feal-differential-cryptanalysis
letta-ai
Guides implementation of differential cryptanalysis on FEAL and Feistel ciphers, emphasizing valid characteristic construction for key recovery.
feal-linear-cryptanalysis
letta-ai
Guides linear cryptanalysis for FEAL and Feistel ciphers, enabling key recovery from known plaintext-ciphertext pairs.
crack-7z-hash
letta-ai
Guides cracking 7z archive password hashes for security testing, CTF challenges, and authorized password recovery scenarios.
password-recovery
letta-ai
Guides recovery of passwords and sensitive data from disk images, corrupted files, and forensic scenarios.
filter-js-from-html
letta-ai
Removes JavaScript from HTML to prevent XSS attacks while preserving structure, essential for secure content sanitization.