Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,850 skills, Security & Compliance has 1636 skills

Categories

Showing 12 of 1636 skills

Per page
Downloads
Sort
Security & Compliancepixel-process-ug/superkit...

security-review

Use when reviewing code for security vulnerabilities, implementing authentication or authorization, handling user input, managing secrets, or auditing dependencies for known CVEs. Triggers: auth implementation, input handling, secrets management, dependency audit, pre-deployment security check, OWASP compliance review.

🇺🇸|EnglishTranslated
2
Security & Compliancesushegaad/claude-skills-g...

iso27001

Expert ISO 27001 compliance assistant for security and compliance teams. Use this skill whenever a user asks about ISO 27001 or ISO/IEC 27001, including any of the following: gap analysis, auditing, compliance assessments, control checklists, policy writing, document generation, Statement of Applicability (SoA), risk assessment, risk registers, risk treatment plans, Annex A controls, ISMS implementation, clause requirements, certification readiness, transitioning from 2013 to 2022, control implementation guidance, incident response policies, access control policies, supplier security, or any information security management system (ISMS) topic. Trigger even if the user doesn't say "skill" — any ISO 27001 or ISMS question should use this skill.

🇺🇸|EnglishTranslated
2
Security & Compliancesushegaad/claude-skills-g...

iso42001

Expert ISO 42001 AI Management System (AIMS) compliance advisor. Use this skill whenever a user asks about ISO/IEC 42001:2023, AI governance, AI management systems, AI risk assessment, AI system impact assessment, Annex A controls for AI, Statement of Applicability for AI systems, AI policy, responsible AI, AI lifecycle management, AI incident management, AI transparency, AI bias, AI certification readiness, or any topic related to implementing or auditing an AI Management System. Also trigger for questions like "how do I become ISO 42001 certified?", "what controls does ISO 42001 require?", "how do I assess AI risk under 42001?", "what is an AIMS?", or any request involving organisational governance of AI systems, responsible AI frameworks, or AI regulatory compliance aligned to an ISO standard.

🇺🇸|EnglishTranslated
2
Security & Compliancetransilienceai/communityt...

techstack-identification

OSINT-based technology stack identification. Discovers company tech stacks using passive reconnaissance across 17 intelligence domains. Given a company name (and optional domain hint), infers frontend, backend, infrastructure, and security technologies using publicly available signals.

🇺🇸|EnglishTranslated
2
Security & Compliancemembranedev/application-s...

signal-sciences

Signal Sciences integration. Manage data, records, and automate workflows. Use when the user wants to interact with Signal Sciences data.

🇺🇸|EnglishTranslated
2
Security & Compliancewinsorllc/upgraded-carniv...

security-audit

Scan code for security vulnerabilities and secrets. Detect exposed secrets, insecure patterns, and common vulnerabilities.

🇺🇸|EnglishTranslated
2
1 scripts/Attention
Security & Complianceclaude-dev-suite/claude-d...

gdpr

GDPR compliance implementation. Data subject rights (access, deletion, portability), consent management, data processing records, PII handling, and privacy by design patterns. USE WHEN: user mentions "GDPR", "data privacy", "right to be forgotten", "data deletion", "consent management", "PII", "data subject request", "privacy policy", "cookie consent" DO NOT USE FOR: authentication - use auth skills; encryption - use `cryptography`; audit logging - use `audit-logging`

🇺🇸|EnglishTranslated
2
Security & Compliancemembranedev/application-s...

fortify

Fortify integration. Manage data, records, and automate workflows. Use when the user wants to interact with Fortify data.

🇺🇸|EnglishTranslated
2
Security & Compliancenexscope-ai/amazon-skills

amazon-product-compliance

Product compliance and safety — certifications, labeling requirements, restricted substances, documentation

🇺🇸|EnglishTranslated
2
Security & Compliancedonchitos/claude-code-gam...

security-audit

Audit the game for security vulnerabilities: save tampering, cheat vectors, network exploits, data exposure, and input validation gaps. Produces a prioritised security report with remediation guidance. Run before any public release or multiplayer launch.

🇺🇸|EnglishTranslated
2
Security & Compliancenayuta/agent-skills

security-scan

Runs available security scanning tools against the current project and produces a consolidated markdown report. Auto-detects installed tools (gitleaks, semgrep, grype, npm audit, bandit, pip-audit, gosec, govulncheck, cargo audit, bundle-audit) and activates language-specific scanners based on project files. Gracefully skips missing tools and provides installation hints. By default scans the entire target directory. Pass --full to make the intent explicit (useful in workflows that combine full-codebase and diff-only scans). Use when running security scans, checking for vulnerabilities, detecting leaked secrets in git history, or validating security posture before commits or releases. Pairs with security-review for a complete security workflow.

🇺🇸|EnglishTranslated
2
2 scripts/Attention
Security & Compliancecodewithmukesh/dotnet-cla...

security-scan

Deep security scanning for .NET applications across 6 layers: vulnerable packages, secrets detection, OWASP code patterns, auth configuration, CORS policy, and data protection. Produces severity-rated findings with specific remediation steps. Load this skill when: "security scan", "security audit", "check for vulnerabilities", "find secrets", "OWASP", "auth review", "CORS check", "security review", "penetration test prep", "CVE check", "vulnerability scan", "hardcoded password", "data protection", "security posture".

🇺🇸|EnglishTranslated
2
1...110111112113114...137
Page