4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

logging-api-requests

jeremylongshore

1.0K

Monitors and logs API requests with correlation IDs, performance metrics, and security audit trails for comprehensive request auditing and compliance.

API Logging
Correlation ID
Security Auditing
4. Security & Compliance

checking-hipaa-compliance

jeremylongshore

1.0K

Audits healthcare applications for HIPAA compliance, verifying protection of protected health information (PHI) against security vulnerabilities.

HIPAA
PHI
Compliance Audit
4. Security & Compliance

webhook-signature-validator

jeremylongshore

1.0K

Validates webhook signatures to ensure authenticity and prevent tampering in API integrations.

Webhook
Signature Validation
API Security
4. Security & Compliance

responding-to-security-incidents

jeremylongshore

1.0K

Guides users through security incident response lifecycle, including classification, evidence collection, and remediation steps for incidents like breaches and ransomware.

Incident Response
Containment
Remediation
4. Security & Compliance

scanning-for-xss-vulnerabilities

jeremylongshore

1.0K

Automatically scans code for cross-site scripting (XSS) vulnerabilities upon user request, identifying security risks.

XSS
Code Scanning
Security Audit
4. Security & Compliance

encrypting-and-decrypting-data

jeremylongshore

1.0K

Validates encryption implementations and cryptographic practices to ensure secure data handling and compliance with security standards.

Encryption
Cryptography
Security Audit
4. Security & Compliance

generating-security-audit-reports

jeremylongshore

1.0K

Generates comprehensive security audit reports to assess security posture, identify vulnerabilities, and evaluate compliance with standards like PCI-DSS.

Security Audit
PCI-DSS
Vulnerability Assessment
4. Security & Compliance

generating-security-audit-reports

jeremylongshore

1.0K

Generates comprehensive security audit reports analyzing system vulnerabilities, compliance status, and providing remediation steps for security posture improvement.

Security Audit
Vulnerability Assessment
Compliance
4. Security & Compliance

vulnerability-report-generator

jeremylongshore

1.0K

Automates generation of security vulnerability reports, documenting identified weaknesses and risks for compliance purposes.

Vulnerability Report
Security Assessment
Compliance
4. Security & Compliance

password-strength-analyzer

jeremylongshore

1.0K

Analyzes password strength to assess security vulnerabilities and ensure compliance with security standards.

Password Strength
Security Auditing
4. Security & Compliance

performing-penetration-testing

jeremylongshore

1.0K

Automates web application penetration testing, identifies OWASP Top 10 vulnerabilities, and provides detailed security flaw reports.

OWASP Top 10
Penetration Testing
Vulnerability Assessment
4. Security & Compliance

exa-enterprise-rbac

jeremylongshore

1.0K

Configures Exa enterprise SSO, role-based access control (RBAC), and organization management for secure access and compliance.

SSO
RBAC
SAML
4. Security & Compliance

scanning-for-secrets

jeremylongshore

1.0K

Scans codebases for exposed secrets using pattern matching and entropy analysis to identify security vulnerabilities.

Secret Scanning
Pattern Matching
Entropy Analysis
4. Security & Compliance

validating-cors-policies

jeremylongshore

1.0K

Validates CORS configurations to identify security vulnerabilities, ensuring proper implementation and preventing unauthorized cross-origin requests.

CORS
Security Auditing
CORS Configuration
4. Security & Compliance

ideogram-data-handling

jeremylongshore

1.0K

Ensures GDPR and CCPA compliance for Ideogram integrations through PII handling, data retention, and privacy pattern implementation.

GDPR
CCPA
PII
4. Security & Compliance

gdpr-compliance-scanner

jeremylongshore

1.0K

Automates scanning and assessment of systems for GDPR regulatory adherence, ensuring data protection compliance.

GDPR
Compliance Scanning
Data Protection
4. Security & Compliance

scanning-container-security

jeremylongshore

1.0K

Automates container security scanning, vulnerability detection, and provides compliance guidance for security control implementation.

Container Scanning
Vulnerability Detection
Security Compliance
4. Security & Compliance

risk-assessment-creator

jeremylongshore

1.0K

Automates enterprise risk assessment creation and management to ensure compliance with security and regulatory frameworks.

Risk Assessment
Compliance
Enterprise
4. Security & Compliance

jwt-token-validator

jeremylongshore

1.0K

Validates JWT tokens to ensure security and integrity in authentication processes.

JWT
Token Validation
Authentication
4. Security & Compliance

path-traversal-finder

jeremylongshore

1.0K

Automates detection of path traversal vulnerabilities to secure file access in web applications.

Path Traversal
Vulnerability Detection
Security Testing
4. Security & Compliance

replit-enterprise-rbac

jeremylongshore

1.0K

Configures Replit Enterprise SSO, role-based access control (RBAC), and organization management for secure enterprise collaboration.

SSO
RBAC
SAML
4. Security & Compliance

performing-security-audits

jeremylongshore

1.0K

Conducts security audits including vulnerability scanning, compliance checks, and infrastructure analysis to identify and mitigate security risks.

vulnerability scanning
compliance
infrastructure security
4. Security & Compliance

replit-data-handling

jeremylongshore

1.0K

Enforces Replit data privacy compliance through PII management, retention policies, and GDPR/CCPA adherence for integrations.

PII
GDPR
CCPA
4. Security & Compliance

clay-webhooks-events

jeremylongshore

1.0K

Provides secure webhook endpoint implementation with signature validation for Clay event notifications, preventing spoofing and ensuring data integrity.

Clay
Webhook
Signature Validation
4. Security & Compliance
PreviousPage 8 of 151 PageNext