4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

ipsw

blacktop

32

Analyzes Apple firmware, binaries, and security components including Mach-O disassembly and iOS/macOS kernel research.

Mach-O
Reverse Engineering
iOS Security
4. Security & Compliance

oauth2-authentication

manutej

32

Provides secure OAuth2 authentication with support for authorization flows, token management, PKCE, OpenID Connect, and security best practices.

OAuth2
PKCE
OpenID Connect
4. Security & Compliance

redteam

neurofoo

31

Conducts adversarial security analysis to identify vulnerabilities and weaknesses in systems before deployment or during security reviews.

Red Team
Vulnerability Assessment
Adversarial Analysis
4. Security & Compliance

slim-container-vulnerability-scanning

NASA-AMMOS

31

Automates container and dependency vulnerability scanning using Grype in CI/CD pipelines and development workflows to detect security issues early.

Grype
Container Scanning
Dependency Scanning
4. Security & Compliance

slim-license

NASA-AMMOS

31

Detects project type and applies appropriate NASA or open source licenses for compliance assurance.

License Management
Open Source Compliance
NASA License
4. Security & Compliance

api-credentials

oaustegard

30

Securely stores and retrieves API keys for external services like Anthropic, Google Gemini, and GitHub to enable safe external API access.

Secrets Management
API Key Management
4. Security & Compliance

input-validation

yonatangross

29

Provides input validation and sanitization patterns to prevent injection attacks and ensure safe user input handling.

Input Validation
Sanitization
Injection Prevention
4. Security & Compliance

llm-safety-patterns

yonatangross

29

Provides security patterns for LLM integrations to defend against prompt injection and prevent hallucinations.

prompt injection
hallucination prevention
4. Security & Compliance

mcp-security-hardening

yonatangross

29

Secures MCP servers through prompt injection defense, tool poisoning prevention, and permission management via allowlist implementation.

Prompt Injection
Tool Poisoning
Permission Management
4. Security & Compliance

owasp-top-10

yonatangross

29

Provides guidance on OWASP Top 10 security vulnerabilities and their mitigations for security audits and code reviews.

OWASP Top 10
Security Audits
Vulnerability Mitigation
4. Security & Compliance

auth-patterns

yonatangross

29

Provides secure authentication and authorization patterns including JWT, OAuth 2.1, and role-based access control for login flows and session management.

JWT
OAuth 2.1
RBAC
4. Security & Compliance

security-scanning

yonatangross

29

Automates security scanning of dependencies and code using tools like npm audit, pip-audit, and Semgrep, with CI/CD integration.

npm audit
Semgrep
CI/CD
4. Security & Compliance

defense-in-depth

yonatangross

29

Enforces defense-in-depth security validation across AI pipeline components to eliminate single points of failure in LLM integrations.

Defense-in-depth
LLM Security
AI Pipeline Security
4. Security & Compliance

wcag-compliance

yonatangross

29

Provides WCAG 2.2 AA compliance patterns for auditing and implementing accessibility requirements in web applications.

WCAG 2.2
Accessibility
AA
4. Security & Compliance

audit-security

iurygdeoliveira

29

Automates security audits for Laravel and Filament applications, checking for XSS, CSP misconfigurations, and IDOR vulnerabilities.

Laravel
XSS
IDOR
4. Security & Compliance

enforce-business-rules

iurygdeoliveira

29

Validates code to prevent security vulnerabilities by enforcing business logic rules such as RBAC and IDOR prevention.

RBAC
IDOR
Multi-tenancy
4. Security & Compliance

rails-security

alec-c4

29

Specialized guidance for implementing Rails security features including authorization policies, data encryption, and vulnerability fixes using Pundit and Lockbox.

Rails
Pundit
Lockbox
4. Security & Compliance

security-compliance

RicherTunes

27

Automates security scanning, vulnerability detection, and compliance checks to ensure adherence to security best practices and regulatory standards.

CodeQL
SAST
Compliance
4. Security & Compliance

security-patterns

Unson-LLC

27

Checks code compliance with security patterns (XSS, CSRF, Input Validation), detects vulnerabilities, and provides remediation suggestions.

XSS
CSRF
Input Validation
4. Security & Compliance

octave-mastery

elevanaltd

27

Provides advanced semantic vocabulary and architectural patterns for the OCTAVE security risk assessment framework, requiring prior OCTAVE literacy.

OCTAVE
Risk Assessment
4. Security & Compliance

octave-compression

elevanaltd

27

Converts natural language security descriptions into structured OCTAVE framework formats, requiring OCTAVE methodology knowledge.

OCTAVE
Risk Assessment
4. Security & Compliance

security-audit-and-vulnerability-scanning

ShunsukeHayashi

27

Conducts comprehensive security audits including dependency scanning, unsafe code detection, and secret management to identify vulnerabilities before production deployment.

Dependency Scanning
Unsafe Code Detection
Secret Management
4. Security & Compliance

code-review

Klimabevaegelsen

26

Automates security code reviews for OWASP vulnerabilities, performance issues, and best practice compliance including TypeScript strict mode and linting.

OWASP
TypeScript
lint
4. Security & Compliance

gcs-medarbejdere-data

Klimabevaegelsen

26

Provides access to GCS employee safety data for compliance tracking, incident reporting, and Arbejdstilsynet inspections.

Arbejdstilsynet
Workplace Safety
Compliance
4. Security & Compliance
PreviousPage 42 of 151 PageNext