4. Security & Compliance
Found 3608 skills
scanning-for-data-privacy-issues
jeremylongshore
Automatically scans code and configs for data privacy risks, including PII exposure and GDPR violations, to ensure compliance.
auditing-access-control
jeremylongshore
Audits access control implementations for vulnerabilities and misconfigurations in IAM policies, ACLs, and access management to ensure security compliance.
waf-rule-creator
jeremylongshore
Creates and manages Web Application Firewall (WAF) rules for security protection. Automatically activates for Security Advanced operations.
scanning-for-data-privacy-issues
jeremylongshore
Automatically scans code and configuration files for data privacy issues, detecting PII exposure and GDPR compliance violations.
input-validation-checker
jeremylongshore
Automates input validation checks to prevent common security vulnerabilities such as SQL injection and XSS.
performing-security-testing
jeremylongshore
Automates security vulnerability testing for applications and APIs, covering OWASP Top 10, SQL injection, and XSS.
license-compliance-scanner
jeremylongshore
Automatically scans software dependencies for license compliance, ensuring adherence to legal and security standards.
perplexity-enterprise-rbac
jeremylongshore
Configures Single Sign-On (SSO), role-based access control (RBAC), and organization management for Perplexity Enterprise.
audit-trail-helper
jeremylongshore
Automates analysis and auditing of system audit trails to ensure security and compliance in enterprise workflows.
checking-hipaa-compliance
jeremylongshore
Checks codebases, infrastructure, and documentation for HIPAA compliance violations related to data privacy and security.
vastai-data-handling
jeremylongshore
Enforces PII data handling, retention policies, and GDPR/CCPA compliance for Vast.ai integrations to meet privacy regulations.
langchain-security-basics
jeremylongshore
Applies security best practices to LangChain applications, focusing on API key management, prompt injection prevention, and safe LLM interaction protocols.
sentry-policy-guardrails
jeremylongshore
Enforces organizational standards and compliance rules for Sentry usage across teams, ensuring consistent configuration and adherence to policies.
checking-hipaa-compliance
jeremylongshore
Automatically scans codebases, infrastructure, and documentation for HIPAA compliance violations related to data privacy, security, and access controls.
scanning-for-gdpr-compliance
jeremylongshore
Scans applications and data systems for GDPR compliance, identifying violations in data protection, privacy rights, and consent management.
log-analysis-security
jeremylongshore
Performs security log analysis to detect threats and anomalies, enhancing monitoring and incident response capabilities.
firewall-rule-generator
jeremylongshore
Automatically generates GCP firewall rules to secure network traffic and enforce security policies.
scanning-container-security
jeremylongshore
Scans container images and running containers for vulnerabilities using Trivy and Snyk to identify security risks.
incident-response-planner
jeremylongshore
Automates creation and management of security incident response plans for rapid breach containment and compliance adherence.
vastai-enterprise-rbac
jeremylongshore
Configures enterprise SSO, role-based access control (RBAC), and organization management for Vast.ai platforms.
granola-security-basics
jeremylongshore
Provides security best practices for Granola meeting data, including implementation of security controls and compliance with data protection policies.
validating-cors-policies
jeremylongshore
Validates CORS policies to identify security vulnerabilities, ensuring correct implementation and protection against unauthorized cross-origin requests.
analyzing-security-headers
jeremylongshore
Analyzes HTTP security headers to identify vulnerabilities, misconfigurations, and provide security recommendations for web applications.
incident-response-planner
jeremylongshore
Automates incident response planning configuration and activation for security teams within the Security Advanced framework.