4. Security & Compliance
Found 3608 skills
ipsw
blacktop
Analyzes Apple firmware, binaries, and security components including Mach-O disassembly and iOS/macOS kernel research.
oauth2-authentication
manutej
Provides secure OAuth2 authentication with support for authorization flows, token management, PKCE, OpenID Connect, and security best practices.
redteam
neurofoo
Conducts adversarial security analysis to identify vulnerabilities and weaknesses in systems before deployment or during security reviews.
slim-container-vulnerability-scanning
NASA-AMMOS
Automates container and dependency vulnerability scanning using Grype in CI/CD pipelines and development workflows to detect security issues early.
slim-license
NASA-AMMOS
Detects project type and applies appropriate NASA or open source licenses for compliance assurance.
api-credentials
oaustegard
Securely stores and retrieves API keys for external services like Anthropic, Google Gemini, and GitHub to enable safe external API access.
input-validation
yonatangross
Provides input validation and sanitization patterns to prevent injection attacks and ensure safe user input handling.
llm-safety-patterns
yonatangross
Provides security patterns for LLM integrations to defend against prompt injection and prevent hallucinations.
mcp-security-hardening
yonatangross
Secures MCP servers through prompt injection defense, tool poisoning prevention, and permission management via allowlist implementation.
owasp-top-10
yonatangross
Provides guidance on OWASP Top 10 security vulnerabilities and their mitigations for security audits and code reviews.
auth-patterns
yonatangross
Provides secure authentication and authorization patterns including JWT, OAuth 2.1, and role-based access control for login flows and session management.
security-scanning
yonatangross
Automates security scanning of dependencies and code using tools like npm audit, pip-audit, and Semgrep, with CI/CD integration.
defense-in-depth
yonatangross
Enforces defense-in-depth security validation across AI pipeline components to eliminate single points of failure in LLM integrations.
wcag-compliance
yonatangross
Provides WCAG 2.2 AA compliance patterns for auditing and implementing accessibility requirements in web applications.
audit-security
iurygdeoliveira
Automates security audits for Laravel and Filament applications, checking for XSS, CSP misconfigurations, and IDOR vulnerabilities.
enforce-business-rules
iurygdeoliveira
Validates code to prevent security vulnerabilities by enforcing business logic rules such as RBAC and IDOR prevention.
rails-security
alec-c4
Specialized guidance for implementing Rails security features including authorization policies, data encryption, and vulnerability fixes using Pundit and Lockbox.
security-compliance
RicherTunes
Automates security scanning, vulnerability detection, and compliance checks to ensure adherence to security best practices and regulatory standards.
security-patterns
Unson-LLC
Checks code compliance with security patterns (XSS, CSRF, Input Validation), detects vulnerabilities, and provides remediation suggestions.
octave-mastery
elevanaltd
Provides advanced semantic vocabulary and architectural patterns for the OCTAVE security risk assessment framework, requiring prior OCTAVE literacy.
octave-compression
elevanaltd
Converts natural language security descriptions into structured OCTAVE framework formats, requiring OCTAVE methodology knowledge.
security-audit-and-vulnerability-scanning
ShunsukeHayashi
Conducts comprehensive security audits including dependency scanning, unsafe code detection, and secret management to identify vulnerabilities before production deployment.
code-review
Klimabevaegelsen
Automates security code reviews for OWASP vulnerabilities, performance issues, and best practice compliance including TypeScript strict mode and linting.
gcs-medarbejdere-data
Klimabevaegelsen
Provides access to GCS employee safety data for compliance tracking, incident reporting, and Arbejdstilsynet inspections.