Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,695 skills, Security & Compliance has 1088 skills

Categories

Showing 12 of 1088 skills

Per page
Downloads
Sort
Security & Complianceaj-geddes/useful-ai-promp...

security-testing

Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security test, vulnerability scanning, OWASP, SQL injection, XSS, CSRF, and penetration testing.

🇺🇸|EnglishTranslated
2
Security & Complianceaj-geddes/useful-ai-promp...

security-headers-configuration

Configure HTTP security headers including CSP, HSTS, X-Frame-Options, and XSS protection. Use when hardening web applications against common attacks.

🇺🇸|EnglishTranslated
2
Security & Compliancejosiahsiegel/claude-plugi...

docker-security-guide

Comprehensive Docker security guidelines and threat mitigation strategies

🇺🇸|EnglishTranslated
2
Security & Complianceaj-geddes/useful-ai-promp...

zero-trust-architecture

Implement Zero Trust security model with identity verification, microsegmentation, least privilege access, and continuous monitoring. Use when building secure cloud-native applications.

🇺🇸|EnglishTranslated
2
Security & Compliancerysweet/amplihack

cybersecurity-analyst

Analyzes events through cybersecurity lens using threat modeling, attack surface analysis, defense-in-depth, zero-trust architecture, and risk-based frameworks (CIA triad, STRIDE, MITRE ATT&CK). Provides insights on vulnerabilities, attack vectors, defense strategies, incident response, and security posture. Use when: Security incidents, vulnerability assessments, threat analysis, security architecture, compliance. Evaluates: Confidentiality, integrity, availability, threat actors, attack patterns, controls, residual risk.

🇺🇸|EnglishTranslated
2
Security & Complianceyoanbernabeu/supabase-pen...

supabase-pentest

Orchestrate a complete Supabase security audit with guided step-by-step execution and ownership confirmation.

🇺🇸|EnglishTranslated
2
Security & Complianceaj-geddes/useful-ai-promp...

security-documentation

Create security policies, guidelines, compliance documentation, and security best practices. Use when documenting security policies, compliance requirements, or security guidelines.

🇺🇸|EnglishTranslated
2
Security & Complianceaj-geddes/useful-ai-promp...

csrf-protection

Implement Cross-Site Request Forgery (CSRF) protection using tokens, SameSite cookies, and origin validation. Use when building forms and state-changing operations.

🇺🇸|EnglishTranslated
2
Security & Complianceyoanbernabeu/supabase-pen...

supabase-audit-rls

Test Row Level Security (RLS) policies for common bypass vulnerabilities and misconfigurations.

🇺🇸|EnglishTranslated
2
Security & Complianceyoanbernabeu/supabase-pen...

supabase-audit-auth-config

Analyze Supabase authentication configuration for security weaknesses and misconfigurations.

🇺🇸|EnglishTranslated
2
Security & Complianceaj-geddes/useful-ai-promp...

secrets-management

Implement secrets management with HashiCorp Vault, AWS Secrets Manager, or Kubernetes Secrets for secure credential storage and rotation.

🇺🇸|EnglishTranslated
2
Security & Complianceyoanbernabeu/supabase-pen...

supabase-audit-authenticated

Create a test user (with explicit permission) to audit what authenticated users can access vs anonymous users. Detects IDOR, cross-user access, and privilege escalation.

🇺🇸|EnglishTranslated
2
1...3435363738...91
Page