4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

break-filter-js-from-html

letta-ai

33

Guides on bypassing HTML sanitization filters to execute JavaScript payloads, targeting XSS filter evasion for security testing and CTF challenges.

XSS
Sanitizer Bypass
HTML Sanitizer
4. Security & Compliance

openssl-selfsigned-cert

letta-ai

33

Guides creation of self-signed SSL/TLS certificates via OpenSSL, including key generation, certificate creation, and verification scripts.

OpenSSL
SSL/TLS
Self-signed
4. Security & Compliance

password-recovery

letta-ai

33

Recovers passwords and sensitive data from disk images, deleted files, and binary data in digital forensic investigations.

Digital Forensics
Password Recovery
Disk Image Analysis
4. Security & Compliance

vulnerable-secret

letta-ai

33

Guides extraction of secrets from vulnerable executables via binary analysis and reverse engineering for CTFs and authorized security testing.

Binary Analysis
Reverse Engineering
Buffer Overflow
4. Security & Compliance

break-filter-js-from-html

letta-ai

33

Guides security professionals in bypassing HTML sanitization filters to test for XSS vulnerabilities in web applications.

XSS Bypass
HTML Sanitizer
Penetration Testing
4. Security & Compliance

sanitize-git-repo

letta-ai

33

Guides removal of API keys, tokens, and credentials from Git repositories to prevent security breaches and ensure compliance.

Git
Secrets
Security
4. Security & Compliance

path-tracing-reverse

letta-ai

33

Guides reverse engineering of compiled binaries to recreate source code with byte-for-byte accuracy, focusing on algorithm extraction and behavioral replication.

Reverse Engineering
Binary Analysis
Source Code Recreation
4. Security & Compliance

vulnhunter

sendaifun

33

Detects and analyzes security vulnerabilities, dangerous APIs, and error-prone configurations across codebases.

Vulnerability Detection
Code Auditing
Security Patterns
4. Security & Compliance

zz-code-recon

sendaifun

33

Builds deep architectural context for security audits, codebase understanding, and vulnerability analysis through trust boundary mapping.

Security Audit
Trust Boundary
Vulnerability Analysis
4. Security & Compliance

test-data-management

proffesor-for-testing

33

Manages test data generation and ensures privacy compliance with GDPR and CCPA, handling PII for realistic and legal testing scenarios.

GDPR
CCPA
PII
4. Security & Compliance

compliance-testing

proffesor-for-testing

33

Provides regulatory compliance testing for GDPR, CCPA, HIPAA, SOC2, and PCI-DSS to ensure legal adherence and audit readiness.

GDPR
Compliance Testing
Audit
4. Security & Compliance

accessibility-testing

proffesor-for-testing

33

Validates WCAG 2.2 compliance, screen reader compatibility, and inclusive design to ensure legal adherence for accessible applications.

WCAG 2.2
Screen Reader
ADA
4. Security & Compliance

security-testing

proffesor-for-testing

33

Tests security vulnerabilities using OWASP principles and security testing techniques for audits, authentication, and authorization.

OWASP
Authentication
Authorization
4. Security & Compliance

input-validation-hardening

Robotti-io

32

Hardens input validation processes to prevent injection attacks and logic abuse through canonicalization and safe parsing techniques.

Input Validation
Canonicalization
Injection Prevention
4. Security & Compliance

threat-model-lite

Robotti-io

32

Provides lightweight, repeatable threat modeling for features/services with prioritized mitigation strategies.

Threat Modeling
Mitigation Prioritization
4. Security & Compliance

secure-fix-validation

Robotti-io

32

Provides a standardized checklist to validate security fixes, ensuring effectiveness and absence of behavioral regressions.

Security Testing
Regression Testing
4. Security & Compliance

genai-acceptance-review

Robotti-io

32

Reviews AI/LLM outputs to prevent over-trust, injection attacks, and unsafe automation, ensuring secure deployment.

Prompt Injection
AI Safety
4. Security & Compliance

dependency-cve-triage

Robotti-io

32

Automates vulnerability triage for software dependencies by assessing reachability, impact, and generating safe remediation plans.

CVE
Dependency Scanning
Vulnerability Triage
4. Security & Compliance

secure-code-review

Robotti-io

32

Conducts systematic security code reviews to identify vulnerabilities and provide actionable remediation steps.

Security Audit
Vulnerability Assessment
Remediation
4. Security & Compliance

secrets-and-logging-hygiene

Robotti-io

32

Prevents secret and PII leaks in logs through automated redaction and security hygiene defaults.

Redaction
PII
Secrets
4. Security & Compliance

authn-authz-review

Robotti-io

32

Reviews authentication and authorization flows (sessions, tokens, RBAC/ABAC) and provides actionable security fix guidance.

RBAC
ABAC
Authz
4. Security & Compliance

security-audit

lovedragonball

32

Reviews application security by implementing best practices including CSP, XSS prevention, input validation, and secrets management.

CSP
XSS
Secrets Management
4. Security & Compliance

accessibility-audit

lovedragonball

32

Audits websites for WCAG compliance, identifies accessibility issues, and provides fixes for inclusive design implementation.

WCAG
a11y
Compliance
4. Security & Compliance

pine-publisher

TradersPost

32

Ensures Pine Scripts meet TradingView's House Rules and documentation standards for community library publication.

Pine Script
TradingView
House Rules
4. Security & Compliance
PreviousPage 41 of 151 PageNext