4. Security & Compliance
Found 3608 skills
bknd-assign-permissions
cameronapak
Assigns role permissions in Bknd using syntax, allow/deny effects, conditional policies, and entity-specific access control.
bknd-row-level-security
cameronapak
Enables row-level security implementation in backend systems with user ownership, multi-tenant isolation, and data access control features.
bknd-public-vs-auth
cameronapak
Configures public and authenticated access patterns in Bknd, including anonymous roles, public/private entity exposure, and mixed access modes.
bknd-protect-endpoint
cameronapak
Secures Bknd API endpoints using auth middleware, role-based access, and permission checks for custom HTTP triggers and plugin routes.
blazemeter-network-security
Blazemeter
Provides a comprehensive guide for BlazeMeter network security configuration, including allowlisting, DNS caching management, and API monitoring security best practices.
kube-audit-kit
crazygit
Automates Kubernetes security audits, generating PSS/NSA-compliant reports by analyzing cluster resources and topology.
safety-pattern-auditor
wildcard
Audits safety patterns in software systems to identify gaps, regressions, and improvement opportunities for safety compliance.
arifos-ledger-inspection
ariffazil
Inspects cross-agent witness ledger for changes, sealed transactions, and pending items with constitutional metrics and rule enforcement (F1-F9).
security
OpenHands
Provides security best practices for secure coding, authentication, authorization, and data protection in applications handling sensitive data.
epic-security
epicweb-dev
Guide to implementing security practices for Epic Stack, including Content Security Policy (CSP), rate limiting, and session security.
epic-auth
epicweb-dev
Comprehensive guide for implementing authentication, sessions, OAuth, 2FA, and passkeys within the Epic Stack framework.
security-auditing
charlesjones-dev
Guides comprehensive security audits to identify vulnerabilities in authentication, input validation, cryptography, and API security.
security-dependency-scanning
charlesjones-dev
Guides comprehensive security scans of web dependencies to detect outdated libraries, CVEs, and security misconfigurations in deployed applications.
accessibility-auditing
charlesjones-dev
Conducts code audits to ensure WCAG compliance, identifying issues in ARIA, keyboard navigation, and screen reader compatibility for inclusive design.
security-scan
muyen
Automates security scans on authentication, API endpoints, and user data modifications to detect vulnerabilities before deployment.
security-audit
bybren-llc
Validates Row-Level Security policies, audits API routes, and scans for vulnerabilities to ensure OWASP compliance.
security-audit
bybren-llc
Validates Row-Level Security policies, performs OWASP compliance checks, and scans for vulnerabilities in API routes and code.
skill-validator
panaversity
Validates AI skills against production-level quality criteria across nine categories, delivering actionable reports with scores and improvement recommendations.
security-auditor
nahisaho
Conducts security audits, vulnerability scans, and penetration testing to identify and mitigate security risks in systems and applications.
constitution-enforcer
nahisaho
Validates adherence to 9 constitutional articles and Phase-1 gates before implementation to ensure project governance compliance.
security-auditor
nahisaho
Conducts security audits, vulnerability scans, and penetration testing to identify and mitigate system risks using industry standards.
traceability-auditor
nahisaho
Validates end-to-end requirements traceability from design to tests, ensuring compliance and identifying coverage gaps.
security-review
zhukunpenglinyutong
Provides security checklists for authentication, input handling, key management, and API endpoints to prevent vulnerabilities.
cloudflare-sandbox
secondsky
SDK for secure execution of untrusted Python/Node.js scripts and AI code in Linux containers at the edge.