Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,488 skills, Security & Compliance has 1085 skills

Categories

Showing 12 of 1085 skills

Per page
Downloads
Sort
Security & Compliancesecondsky/claude-skills

access-control-rbac

Role-based access control (RBAC) with permissions and policies. Use for admin dashboards, enterprise access, multi-tenant apps, fine-grained authorization, or encountering permission hierarchies, role inheritance, policy conflicts.

🇺🇸|EnglishTranslated
2
Security & Compliancesecondsky/claude-skills

security-headers-configuration

Configures HTTP security headers to protect against XSS, clickjacking, and MIME sniffing attacks. Use when hardening web applications, passing security audits, or implementing Content Security Policy.

🇺🇸|EnglishTranslated
2
Security & Compliancegetsentry/skills

django-access-review

Django access control and IDOR security review. Use when reviewing Django views, DRF viewsets, ORM queries, or any Python/Django code handling user authorization. Trigger keywords: "IDOR", "access control", "authorization", "Django permissions", "object permissions", "tenant isolation", "broken access".

🇺🇸|EnglishTranslated
2
Security & Compliancejthack/ffuf_claude_skill

ffuf-web-fuzzing

Expert guidance for ffuf web fuzzing during penetration testing, including authenticated fuzzing with raw requests, auto-calibration, and result analysis

🇺🇸|EnglishTranslated
2
1 scripts/Checked
Security & Compliancesendaifun/skills

vulnhunter

Security vulnerability detection and variant analysis skill. Use when hunting for dangerous APIs, footgun patterns, error-prone configurations, and vulnerability variants across codebases. Combines sharp edges detection with variant hunting methodology.

🇺🇸|EnglishTranslated
2
Security & Compliancepatricio0312rev/skills

multi-tenant-safety-checker

Ensures tenant isolation at query and policy level using Row Level Security, automated testing, and security audits. Prevents data leakage between tenants. Use for "multi-tenancy", "tenant isolation", "RLS", or "data security".

🇺🇸|EnglishTranslated
2
Security & Complianceomer-metin/skills-for-ant...

smart-contract-auditor

Elite security researcher who hunts vulnerabilities in smart contracts. Has found critical bugs worth millions in TVL. Specializes in reentrancy, access control, oracle manipulation, and economic exploits across EVM and Solana.Use when "audit, security review, vulnerability, exploit, reentrancy, access control, oracle manipulation, flash loan attack, smart contract security, slither, mythril, formal verification, invariant testing, security, audit, smart-contracts, solidity, vulnerabilities, defi, exploits, reentrancy, access-control, oracle-manipulation" mentioned.

🇺🇸|EnglishTranslated
2
Security & Complianceanthropics/knowledge-work...

audit-support

Support SOX 404 compliance with control testing methodology, sample selection, and documentation standards. Use when generating testing workpapers, selecting audit samples, classifying control deficiencies, or preparing for internal or external audits.

🇺🇸|EnglishTranslated
2
Security & Compliancemindrally/skills

python-cybersecurity-tool-development

Guidelines for building Python cybersecurity tools with secure coding practices, async scanning, and structured security testing.

🇺🇸|EnglishTranslated
2
Security & Compliancemindrally/skills

auth0-authentication

Guidelines for implementing Auth0 authentication with best practices for security, rules, actions, and SDK integration

🇺🇸|EnglishTranslated
2
Security & Compliancegmh5225/awesome-game-secu...

game-hacking-techniques

Guide for game hacking techniques and cheat development. Use this skill when researching memory manipulation, code injection, ESP/aimbot development, overlay rendering, or game exploitation methodologies.

🇺🇸|EnglishTranslated
2
Security & Compliancesickn33/antigravity-aweso...

threat-modeling-expert

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture reviews, threat identification, and secure-by-design planning.

🇺🇸|EnglishTranslated
2
1...1314151617...91
Page