Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,167 skills, Security & Compliance has 1070 skills

Categories

Showing 12 of 1070 skills

Per page
Downloads
Sort
Security & Compliancevchirrav/owasp-secure-cod...

sast-flawfinder

Run Flawfinder SAST scans on C/C++ code. Detects buffer overflows, format string vulnerabilities, race conditions, and other memory safety issues.

🇺🇸|EnglishTranslated
1
Security & Compliancevchirrav/owasp-secure-cod...

secret-scan-gitleaks

Run Gitleaks to detect hardcoded secrets in git repositories. Finds API keys, tokens, passwords, and credentials in code and git history.

🇺🇸|EnglishTranslated
1
Security & Compliancevchirrav/owasp-secure-cod...

sast-gosec

Run gosec SAST scans on Go code. Detects SQL injection, hardcoded credentials, insecure TLS, command injection, and other Go security issues.

🇺🇸|EnglishTranslated
1
Security & Compliancevchirrav/owasp-secure-cod...

sca-grype

Run Anchore Grype for SCA vulnerability scanning on filesystems and container images. Matches dependencies against multiple vulnerability databases (NVD, GitHub, OS advisories).

🇺🇸|EnglishTranslated
1
Security & Compliancevchirrav/owasp-secure-cod...

sast-eslint-security

Run ESLint with security plugins on JavaScript/TypeScript code. Detects eval usage, non-literal RegExp, prototype pollution, and other JS/TS security anti-patterns.

🇺🇸|EnglishTranslated
1
Security & Compliancevchirrav/owasp-secure-cod...

network-scan-nmap

Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.

🇺🇸|EnglishTranslated
1
Security & Compliancegmh5225/awesome-llvm-secu...

binary-lifting

Expertise in binary lifting techniques - converting machine code to LLVM IR for analysis, decompilation, and recompilation. Use this skill when working on reverse engineering, binary analysis, deobfuscation, or converting binaries to higher-level representations.

🇺🇸|EnglishTranslated
1
Security & Compliancetuckerandrew21/eft-tracke...

security-auth

Authentication and security patterns for EFT-Tracker using NextAuth. Covers password reset, session management, CSRF protection, and security reviews. Activates when user mentions: auth, authentication, password, NextAuth, session, security, login, logout, CSRF, rate limit, token, JWT.

🇺🇸|EnglishTranslated
1
Security & Compliancebrownfinesecurity/iothack...

ffind

Advanced file finder with type detection and filesystem extraction for analyzing firmware and extracting embedded filesystems. Use when you need to analyze firmware files, identify file types, or extract ext2/3/4 or F2FS filesystems.

🇺🇸|EnglishTranslated
1
Security & Compliancepatricio0312rev/skills

api-security-hardener

Hardens API security with rate limiting, input validation, authentication, and protection against common attacks. Use when users request "API security", "secure API", "rate limiting", "input validation", or "API protection".

🇺🇸|EnglishTranslated
1
Security & Compliancegtmagents/gtm-agents

patient-journey-mapping

Framework for documenting compliant patient journeys with touchpoints, consent, and escalation paths.

🇺🇸|EnglishTranslated
1
Security & Compliancegtmagents/gtm-agents

compliance-briefing-kit

Standardized template for campaign compliance intake, reviews, and approvals.

🇺🇸|EnglishTranslated
1
1...8384858687...90
Page