Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 44,738 skills, Security & Compliance has 1683 skills

Categories

Showing 12 of 1683 skills

Per page
Downloads
Sort
Security & Complianceparhumm/jaan-to

sec-audit-remediate

Generate security fixes from detect-dev findings with regression tests. Use when remediating security vulnerabilities.

🇺🇸|EnglishTranslated
2
Security & Compliancebjesuiter/skills

security-check

Red-team security review for code changes. Use when reviewing pending git changes, branch diffs, or new features for security vulnerabilities, permission gaps, injection risks, and attack vectors. Acts as a pen-tester analyzing code.

🇺🇸|EnglishTranslated
2
Security & Compliancemohhh-ok/field-guard

field-guard

Use this skill when working with the field-guard library (TypeScript field-level access control). Provides patterns for defineGuard, withCheck, withDerive, combineGuards, and mergeFieldVerdicts.

🇺🇸|EnglishTranslated
2
Security & Complianceghostsecurity/skills

ghost-scan-deps

Ghost Security - Software Composition Analysis (SCA) scanner. Scans dependency lockfiles for known vulnerabilities, identifies CVEs, and generates findings with severity levels and remediation guidance. Use when the user asks about dependency vulnerabilities, vulnerable packages, CVE checks, security audits of dependencies, or wants to scan lockfiles like package-lock.json, yarn.lock, go.sum, or Gemfile.lock.

🇺🇸|EnglishTranslated
2
Security & Complianceghostsecurity/skills

ghost-report

Ghost Security — combined security report. Aggregates findings from all scan skills (scan-deps, scan-secrets, scan-code) into a single prioritized report focused on the highest risk, highest confidence issues. Use when the user requests a security overview, vulnerability summary, full security audit, or combined scan results.

🇺🇸|EnglishTranslated
2
Security & Compliancebacoco/bmad-skills

bmad-security-review

Hardens designs and implementations with structured security reviews.

🇺🇸|EnglishTranslated
2
Security & Complianceproflead/codex-skills-lib...

config-hardening

Harden configuration and defaults for safer deployment. Use when a mid-level developer needs to reduce misconfig risks.

🇺🇸|EnglishTranslated
2
Security & Complianceyuniorglez/gemini-elite-c...

security-audit-pro

Senior Data Security Architect & Forensic Auditor for 2026. Specialized in Row Level Security (RLS) enforcement, Zero-Trust database architecture, and automated data access auditing. Expert in neutralizing unauthorized access in Convex, Supabase, and Postgres environments through strict policy validation, JIT (Just-in-Time) access controls, and forensic trace analysis.

🇺🇸|EnglishTranslated
2
Security & Compliancejeremylongshore/claude-co...

sentry-security-basics

Configure Sentry security settings and data protection. Use when setting up data scrubbing, managing sensitive data, or configuring security policies. Trigger with phrases like "sentry security", "sentry PII", "sentry data scrubbing", "secure sentry".

🇺🇸|EnglishTranslated
2
Security & Compliancecipherstash/protectjs

stash-encryption

Implement field-level encryption with @cipherstash/stack. Covers schema definition, encrypt/decrypt operations, searchable encryption (equality, free-text, range, JSON), bulk operations, model operations, identity-aware encryption with LockContext, multi-tenant keysets, and the full TypeScript type system. Use when adding encryption to a project, defining encrypted schemas, or working with the CipherStash Encryption API.

🇺🇸|EnglishTranslated
2
Security & Compliancenateberkopec/dotfiles

env-to-fnox

This skill should be used when users want to migrate from .env files to fnox with 1Password (or another secret provider). It covers installing fnox, creating 1Password items, configuring fnox.toml, and integrating with mise. Use when users mention ".env migration", "fnox setup", "1password secrets", or want to improve their secret management workflow.

🇺🇸|EnglishTranslated
2
Security & Complianceoakoss/agent-skills

database-security

Database security auditor specialized in Row Level Security (RLS) enforcement, Zero-Trust database architecture, and forensic audit trails. Covers Supabase RLS policies, Postgres security, Convex auth guards, PGAudit configuration, JIT access controls, and database-specific compliance validation. Use when auditing database access policies, implementing RLS in Supabase or Postgres, configuring Convex auth guards, setting up audit logging, reviewing database security, or validating database-level compliance requirements.

🇺🇸|EnglishTranslated
2
1...121122123124125...141
Page