4. Security & Compliance
Found 3608 skills
dma-attack-techniques
gmh5225
Guide for researching PCIe DMA attacks using FPGA hardware, covering techniques, pcileech, and firmware development for security analysis.
game-hacking-techniques
gmh5225
Guide to game hacking techniques including memory manipulation, code injection, and ESP/aimbot development.
30-auth-module-architecture
TencentBlueKing
Provides architectural guidance for authentication and authorization modules, including IAM integration, RBAC implementation, and OAuth flows for secure access control.
37-ticket-module-architecture
TencentBlueKing
Guides secure credential management architecture including encryption, authorization, and access control for password, SSH, and token types.
45
TencentBlueKing
Manages IAM RBAC permission model changes including resource type definition, permission configuration, migration scripts, and callback implementation.
19-jwt-security
TencentBlueKing
Provides a guide for implementing JWT security authentication, covering token generation, validation, refresh, permission checks, and OAuth2 integration.
20-audit-logging
TencentBlueKing
Provides guidance for implementing audit logging to track user operations, sensitive actions, and fulfill compliance requirements.
security-principles
exceptionless
Provides security best practices for Exceptionless codebase including secrets management, input validation, and secure defaults to avoid common vulnerabilities.
auditing-pre-release-security
OneKeyHQ
Audits security and supply-chain risks by comparing code changes between two Git references for pre-release validation.
pr-review
OneKeyHQ
Security-first PR review checklist targeting auth, sensitive data, supply-chain risks, and performance while avoiding UI nitpicks.
red-team-tactics
vudovn
Provides MITRE ATT&CK-based red team tactics covering attack phases, detection evasion, and reporting methodologies.
vulnerability-scanner
vudovn
Performs advanced vulnerability analysis using OWASP 2025 standards, including supply chain security assessment and attack surface mapping for risk prioritization.
jar-audit-agent
jar-analyzer
Provides evidence-driven Java security audits, converting conclusions into reproducible evidence and measurable coverage metrics.
fuzzing-dictionary
trailofbits
Provides domain-specific token dictionaries to enhance security testing via fuzzing of parsers, protocols, and format-specific code.
algorand-vulnerability-scanner
trailofbits
Scans Algorand smart contracts for security vulnerabilities including rekeying attacks and access control issues, aiding in project audits.
token-integration-analyzer
trailofbits
Analyzes ERC20/ERC721 token implementations for security compliance, checks for vulnerabilities, and assesses contract composition and owner privileges.
semgrep-rule-creator
trailofbits
Creates custom Semgrep rules to detect security vulnerabilities and bug patterns in code for enhanced code auditing and security analysis.
address-sanitizer
trailofbits
Detects memory errors such as buffer overflows and use-after-free in C/C++ code during fuzzing to enhance security.
solana-vulnerability-scanner
trailofbits
Scans Solana/Anchor programs for critical security vulnerabilities including arbitrary CPI and improper PDA validation during smart contract audits.
wycheproof
trailofbits
Provides test vectors to validate cryptographic implementations against known attacks and edge cases.
harness-writing
trailofbits
Provides techniques for crafting effective fuzzing harnesses to test software security across multiple programming languages.
libfuzzer
trailofbits
Coverage-guided fuzzing tool integrated with LLVM to automatically detect security vulnerabilities in C/C++ code via random input testing.
aflpp
trailofbits
AFL++ enhances security testing with multi-core fuzzing capabilities for C/C++ applications to uncover vulnerabilities.
ton-vulnerability-scanner
trailofbits
Scans TON smart contracts for critical security vulnerabilities in FunC code.