4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

api-authentication

applied-artificial-intelligence

26

Guides implementation of secure API authentication using JWT, OAuth 2.0, and API keys with security best practices and vulnerability prevention.

JWT
OAuth 2.0
API Keys
4. Security & Compliance

nda-review

lawvable

26

Reviews unilateral commercial NDAs from Recipient or Discloser perspectives, generating clause-by-clause issue logs with redlines, rationales, and deadlines.

NDA
Redlining
Compliance
4. Security & Compliance

politique-confidentialite

lawvable

26

Comprehensive guide for drafting GDPR-compliant privacy policies with CNIL 2020 recommendations and reference templates for websites/apps.

GDPR
CNIL
Privacy Policy
4. Security & Compliance

politique-cookies

lawvable

26

Guide for drafting GDPR and ePrivacy compliant cookie policies with CNIL 2020 recommendations and reference templates.

GDPR
ePrivacy
CNIL
4. Security & Compliance

whistleblower-policy-fr

lawvable

26

Guides evaluation and drafting of compliant whistleblower policies based on EU Directive 2019/1937, Sapin II, and CNIL frameworks.

EU Whistleblower Directive
Sapin II
CNIL
4. Security & Compliance

incident-responder

zenobi-us

25

Expert in security incident response, conducting evidence collection, forensic analysis, and coordinated mitigation to minimize impact and prevent recurrence.

Incident Response
Digital Forensics
Security Operations
4. Security & Compliance

risk-manager

zenobi-us

25

Provides expert risk assessment, mitigation, and regulatory compliance services to protect organizations from financial, operational, and strategic risks.

Risk Assessment
Regulatory Compliance
Risk Modeling
4. Security & Compliance

payment-integration

zenobi-us

25

Expert in secure payment gateway integration with PCI compliance, fraud prevention, and multi-currency transaction processing for reliable financial operations.

Payment Gateway
PCI Compliance
Fraud Prevention
4. Security & Compliance

penetration-tester

zenobi-us

25

Conducts ethical penetration testing, vulnerability assessments, and security evaluations to identify and validate system weaknesses.

Penetration Testing
Vulnerability Assessment
Exploit Development
4. Security & Compliance

security-engineer

zenobi-us

25

Expert infrastructure security engineer specializing in DevSecOps, cloud security, compliance, and security automation with zero-trust architecture.

DevSecOps
Zero-trust
Cloud Security
4. Security & Compliance

security-auditor

zenobi-us

25

Conducts comprehensive security assessments, validates compliance, and manages risks to ensure adherence to security frameworks and regulations.

Compliance Auditing
Risk Management
Security Frameworks
4. Security & Compliance

compliance-auditor

zenobi-us

25

Provides automated validation and continuous monitoring for regulatory compliance frameworks including GDPR, HIPAA, and SOC 2.

GDPR
HIPAA
SOC 2
4. Security & Compliance

dependency-manager

zenobi-us

25

Manages dependencies across ecosystems with security auditing, conflict resolution, and supply chain security focus.

Security Auditing
Supply Chain Security
4. Security & Compliance

secrets-scanner

jamesjlundin

25

Scans codebases for secrets, API keys, credentials, and PII to detect hardcoded sensitive data, aiding security audits.

Secrets Scanning
Hardcoded Secrets
PII
4. Security & Compliance

software-security-appsec

vasilyu1983

25

Provides modern application security patterns aligned with OWASP Top 10, API Security Top 10, NIST SSDF, and zero trust principles.

OWASP Top 10
NIST SSDF
Zero Trust
4. Security & Compliance

find-bugs

steveclarke

24

Identifies bugs, security flaws, and code quality issues in local branch changes for security audits and code reviews.

Static Analysis
Security Auditing
Code Quality
4. Security & Compliance

1password

steveclarke

24

Fetches API keys, tokens, and credentials securely from 1Password using CLI, requiring the secret reference (op://Vault/Item/field) instead of the actual secret.

1Password
Secret Management
op://
4. Security & Compliance

resonance-security

manusco

24

Specialized security auditor for reviewing pull requests, conducting STRIDE threat modeling, and validating zero-trust architecture compliance.

STRIDE
Zero-Trust
Code Review
4. Security & Compliance

safety-pattern-auditor

wildcard

23

Audits safety patterns in software systems to identify gaps, regressions, and improvement opportunities for safety compliance.

Safety Patterns
Code Audit
Compliance
4. Security & Compliance

arifos-ledger-inspection

ariffazil

23

Inspects cross-agent witness ledger for changes, sealed transactions, and pending items with constitutional metrics and rule enforcement (F1-F9).

Ledger
Constitutional Metrics
F1-F9
4. Security & Compliance

security-patterns

anton-abyzov

23

Real-time security pattern detector for code editors, warning about command injection, XSS, and unsafe deserialization during file edits.

Command Injection
XSS
Unsafe Deserialization
4. Security & Compliance

security

anton-abyzov

23

Provides comprehensive application security services including threat modeling, penetration testing, vulnerability assessment, and compliance with GDPR, HIPAA, and OWASP standards.

Penetration Testing
OWASP
GDPR
4. Security & Compliance

pci-compliance

anton-abyzov

23

Enables secure handling of payment card data by implementing PCI DSS compliance requirements for payment systems.

PCI DSS
Payment Security
Compliance
4. Security & Compliance

phase-7-seo-security

popup-studio-ai

23

Optimizes SEO and security via meta tags, semantic HTML, and vulnerability checks for XSS/CSRF.

Meta Tags
XSS
CSRF
4. Security & Compliance
PreviousPage 43 of 151 PageNext