Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,811 skills, Security & Compliance has 1635 skills

Categories

Showing 12 of 1635 skills

Per page
Downloads
Sort
Security & Compliancesickn33/antigravity-aweso...

red-team-tools

This skill should be used when the user asks to "follow red team methodology", "perform bug bounty hunting", "automate reconnaissance", "hunt for XSS vulnerabilities", "enumerate su...

🇺🇸|EnglishTranslated
2
Security & Complianceconvisolabs/conviso-skill...

conviso-vuln-remediator

Triage and remediation workflow for Conviso vulnerabilities using conviso-cli, with safe defaults (read-only and preview-first) and explicit human approval for apply mode.

🇺🇸|EnglishTranslated
2
8 scripts/Attention
Security & Complianceconvisolabs/conviso-skill...

conviso-vuln-assignee-manager

Assign vulnerability owners at scale using conviso-cli with mapping-driven rules, preview-first execution, and explicit apply confirmation.

🇺🇸|EnglishTranslated
2
6 scripts/Attention
Security & Complianceintenxus/aave-ai

aave-security-foundations

Security baseline for AAVE integration and execution scripts. Use when user asks for AAVE security review, pre-trade checks, liquidation safety, allowance minimization, or execution hardening.

🇺🇸|EnglishTranslated
2
Security & Complianceparhumm/jaan-to

sec-audit-remediate

Generate security fixes from detect-dev findings with regression tests. Use when remediating security vulnerabilities.

🇺🇸|EnglishTranslated
2
Security & Compliancebjesuiter/skills

security-check

Red-team security review for code changes. Use when reviewing pending git changes, branch diffs, or new features for security vulnerabilities, permission gaps, injection risks, and attack vectors. Acts as a pen-tester analyzing code.

🇺🇸|EnglishTranslated
2
Security & Compliancemohhh-ok/field-guard

field-guard

Use this skill when working with the field-guard library (TypeScript field-level access control). Provides patterns for defineGuard, withCheck, withDerive, combineGuards, and mergeFieldVerdicts.

🇺🇸|EnglishTranslated
2
Security & Complianceghostsecurity/skills

ghost-scan-deps

Ghost Security - Software Composition Analysis (SCA) scanner. Scans dependency lockfiles for known vulnerabilities, identifies CVEs, and generates findings with severity levels and remediation guidance. Use when the user asks about dependency vulnerabilities, vulnerable packages, CVE checks, security audits of dependencies, or wants to scan lockfiles like package-lock.json, yarn.lock, go.sum, or Gemfile.lock.

🇺🇸|EnglishTranslated
2
Security & Complianceghostsecurity/skills

ghost-report

Ghost Security — combined security report. Aggregates findings from all scan skills (scan-deps, scan-secrets, scan-code) into a single prioritized report focused on the highest risk, highest confidence issues. Use when the user requests a security overview, vulnerability summary, full security audit, or combined scan results.

🇺🇸|EnglishTranslated
2
Security & Compliancebacoco/bmad-skills

bmad-security-review

Hardens designs and implementations with structured security reviews.

🇺🇸|EnglishTranslated
2
Security & Complianceproflead/codex-skills-lib...

config-hardening

Harden configuration and defaults for safer deployment. Use when a mid-level developer needs to reduce misconfig risks.

🇺🇸|EnglishTranslated
2
Security & Complianceyuniorglez/gemini-elite-c...

security-audit-pro

Senior Data Security Architect & Forensic Auditor for 2026. Specialized in Row Level Security (RLS) enforcement, Zero-Trust database architecture, and automated data access auditing. Expert in neutralizing unauthorized access in Convex, Supabase, and Postgres environments through strict policy validation, JIT (Just-in-Time) access controls, and forensic trace analysis.

🇺🇸|EnglishTranslated
2
1...113114115116117...137
Page