4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

bknd-assign-permissions

cameronapak

23

Assigns role permissions in Bknd using syntax, allow/deny effects, conditional policies, and entity-specific access control.

RBAC
Fine-Grained Access
Conditional Policies
4. Security & Compliance

bknd-row-level-security

cameronapak

23

Enables row-level security implementation in backend systems with user ownership, multi-tenant isolation, and data access control features.

Row-Level Security
Multi-tenancy
Data Access Control
4. Security & Compliance

bknd-public-vs-auth

cameronapak

23

Configures public and authenticated access patterns in Bknd, including anonymous roles, public/private entity exposure, and mixed access modes.

Access Control
Authentication
Entity Patterns
4. Security & Compliance

bknd-protect-endpoint

cameronapak

23

Secures Bknd API endpoints using auth middleware, role-based access, and permission checks for custom HTTP triggers and plugin routes.

Auth Middleware
Role-Based Access
API Security
4. Security & Compliance

blazemeter-network-security

Blazemeter

23

Provides a comprehensive guide for BlazeMeter network security configuration, including allowlisting, DNS caching management, and API monitoring security best practices.

Allowlisting
DNS Configuration
API Monitoring
4. Security & Compliance

kube-audit-kit

crazygit

23

Automates Kubernetes security audits, generating PSS/NSA-compliant reports by analyzing cluster resources and topology.

Kubernetes
PSS
NSA
4. Security & Compliance

safety-pattern-auditor

wildcard

23

Audits safety patterns in software systems to identify gaps, regressions, and improvement opportunities for safety compliance.

Safety Patterns
Code Audit
Compliance
4. Security & Compliance

arifos-ledger-inspection

ariffazil

23

Inspects cross-agent witness ledger for changes, sealed transactions, and pending items with constitutional metrics and rule enforcement (F1-F9).

Ledger
Constitutional Metrics
F1-F9
4. Security & Compliance

security

OpenHands

22

Provides security best practices for secure coding, authentication, authorization, and data protection in applications handling sensitive data.

Authentication
Authorization
Data Protection
4. Security & Compliance

epic-security

epicweb-dev

22

Guide to implementing security practices for Epic Stack, including Content Security Policy (CSP), rate limiting, and session security.

CSP
Rate Limiting
Session Security
4. Security & Compliance

epic-auth

epicweb-dev

22

Comprehensive guide for implementing authentication, sessions, OAuth, 2FA, and passkeys within the Epic Stack framework.

Epic Stack
OAuth
2FA
4. Security & Compliance

security-auditing

charlesjones-dev

22

Guides comprehensive security audits to identify vulnerabilities in authentication, input validation, cryptography, and API security.

Code Auditing
Authentication
API Security
4. Security & Compliance

security-dependency-scanning

charlesjones-dev

22

Guides comprehensive security scans of web dependencies to detect outdated libraries, CVEs, and security misconfigurations in deployed applications.

Dependency Scanning
CVE
Security Auditing
4. Security & Compliance

accessibility-auditing

charlesjones-dev

22

Conducts code audits to ensure WCAG compliance, identifying issues in ARIA, keyboard navigation, and screen reader compatibility for inclusive design.

WCAG
ARIA
Keyboard Navigation
4. Security & Compliance

security-scan

muyen

22

Automates security scans on authentication, API endpoints, and user data modifications to detect vulnerabilities before deployment.

Authentication
API Security
Vulnerability Scan
4. Security & Compliance

security-audit

bybren-llc

22

Validates Row-Level Security policies, audits API routes, and scans for vulnerabilities to ensure OWASP compliance.

RLS
OWASP
Vulnerability Scanning
4. Security & Compliance

security-audit

bybren-llc

22

Validates Row-Level Security policies, performs OWASP compliance checks, and scans for vulnerabilities in API routes and code.

RLS
OWASP
Vulnerability Scanning
4. Security & Compliance

skill-validator

panaversity

22

Validates AI skills against production-level quality criteria across nine categories, delivering actionable reports with scores and improvement recommendations.

Quality Scoring
Skill Audit
Validation Report
4. Security & Compliance

security-auditor

nahisaho

22

Conducts security audits, vulnerability scans, and penetration testing to identify and mitigate security risks in systems and applications.

OWASP
CVE
Penetration Testing
4. Security & Compliance

constitution-enforcer

nahisaho

22

Validates adherence to 9 constitutional articles and Phase-1 gates before implementation to ensure project governance compliance.

Constitutional Compliance
Phase-1 Gates
4. Security & Compliance

security-auditor

nahisaho

22

Conducts security audits, vulnerability scans, and penetration testing to identify and mitigate system risks using industry standards.

OWASP
CVE
Penetration Testing
4. Security & Compliance

traceability-auditor

nahisaho

22

Validates end-to-end requirements traceability from design to tests, ensuring compliance and identifying coverage gaps.

Traceability Matrix
Requirements Coverage
Gap Detection
4. Security & Compliance

security-review

zhukunpenglinyutong

22

Provides security checklists for authentication, input handling, key management, and API endpoints to prevent vulnerabilities.

Authentication
Input Validation
API Security
4. Security & Compliance

cloudflare-sandbox

secondsky

21

SDK for secure execution of untrusted Python/Node.js scripts and AI code in Linux containers at the edge.

Cloudflare
Sandbox
Edge Computing
4. Security & Compliance
PreviousPage 44 of 151 PageNext