4. Security & Compliance
Found 3608 skills
logging-api-requests
jeremylongshore
Monitors and logs API requests with correlation IDs, performance metrics, and security audit trails for comprehensive request auditing and compliance.
checking-hipaa-compliance
jeremylongshore
Audits healthcare applications for HIPAA compliance, verifying protection of protected health information (PHI) against security vulnerabilities.
webhook-signature-validator
jeremylongshore
Validates webhook signatures to ensure authenticity and prevent tampering in API integrations.
responding-to-security-incidents
jeremylongshore
Guides users through security incident response lifecycle, including classification, evidence collection, and remediation steps for incidents like breaches and ransomware.
scanning-for-xss-vulnerabilities
jeremylongshore
Automatically scans code for cross-site scripting (XSS) vulnerabilities upon user request, identifying security risks.
encrypting-and-decrypting-data
jeremylongshore
Validates encryption implementations and cryptographic practices to ensure secure data handling and compliance with security standards.
generating-security-audit-reports
jeremylongshore
Generates comprehensive security audit reports to assess security posture, identify vulnerabilities, and evaluate compliance with standards like PCI-DSS.
generating-security-audit-reports
jeremylongshore
Generates comprehensive security audit reports analyzing system vulnerabilities, compliance status, and providing remediation steps for security posture improvement.
vulnerability-report-generator
jeremylongshore
Automates generation of security vulnerability reports, documenting identified weaknesses and risks for compliance purposes.
password-strength-analyzer
jeremylongshore
Analyzes password strength to assess security vulnerabilities and ensure compliance with security standards.
performing-penetration-testing
jeremylongshore
Automates web application penetration testing, identifies OWASP Top 10 vulnerabilities, and provides detailed security flaw reports.
exa-enterprise-rbac
jeremylongshore
Configures Exa enterprise SSO, role-based access control (RBAC), and organization management for secure access and compliance.
scanning-for-secrets
jeremylongshore
Scans codebases for exposed secrets using pattern matching and entropy analysis to identify security vulnerabilities.
validating-cors-policies
jeremylongshore
Validates CORS configurations to identify security vulnerabilities, ensuring proper implementation and preventing unauthorized cross-origin requests.
ideogram-data-handling
jeremylongshore
Ensures GDPR and CCPA compliance for Ideogram integrations through PII handling, data retention, and privacy pattern implementation.
gdpr-compliance-scanner
jeremylongshore
Automates scanning and assessment of systems for GDPR regulatory adherence, ensuring data protection compliance.
scanning-container-security
jeremylongshore
Automates container security scanning, vulnerability detection, and provides compliance guidance for security control implementation.
risk-assessment-creator
jeremylongshore
Automates enterprise risk assessment creation and management to ensure compliance with security and regulatory frameworks.
jwt-token-validator
jeremylongshore
Validates JWT tokens to ensure security and integrity in authentication processes.
path-traversal-finder
jeremylongshore
Automates detection of path traversal vulnerabilities to secure file access in web applications.
replit-enterprise-rbac
jeremylongshore
Configures Replit Enterprise SSO, role-based access control (RBAC), and organization management for secure enterprise collaboration.
performing-security-audits
jeremylongshore
Conducts security audits including vulnerability scanning, compliance checks, and infrastructure analysis to identify and mitigate security risks.
replit-data-handling
jeremylongshore
Enforces Replit data privacy compliance through PII management, retention policies, and GDPR/CCPA adherence for integrations.
clay-webhooks-events
jeremylongshore
Provides secure webhook endpoint implementation with signature validation for Clay event notifications, preventing spoofing and ensuring data integrity.