Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,756 skills, Security & Compliance has 1633 skills

Categories

Showing 12 of 1633 skills

Per page
Downloads
Sort
Security & Compliancedidit-protocol/skills

didit-database-validation

Integrate Didit Database Validation API to verify personal data against government databases. Use when the user wants to validate identity against government records, verify national ID numbers, check CPF/CURP/DNI/cedula numbers, perform identity database lookups, validate identity documents against official sources, or implement database verification for Latin American or Spanish identity documents using Didit. Supports 18 countries with 1x1 and 2x2 matching methods.

🇺🇸|EnglishTranslated
2
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

managing-intelligence-lifecycle

Manages the end-to-end cyber threat intelligence lifecycle from planning and direction through collection, processing, analysis, dissemination, and feedback to ensure intelligence products meet stakeholder requirements and continuously improve. Use when establishing or maturing a CTI program, defining intelligence requirements with business stakeholders, or building feedback loops between intelligence consumers and producers. Activates for requests involving CTI program maturity, intelligence requirements, PIRs, or intelligence lifecycle management.

🇺🇸|EnglishTranslated
2
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

implementing-iec-62443-security-zones

This skill covers designing and implementing security zones and conduits for industrial automation and control systems (IACS) per IEC 62443-3-2. It addresses zone partitioning based on risk assessment, assigning Security Level targets (SL-T), designing conduit security controls, implementing microsegmentation with industrial firewalls, and validating zone architecture through traffic analysis and penetration testing against the Purdue Reference Model.

🇺🇸|EnglishTranslated
2
1 scripts/Checked
Security & Compliancezenless-lab/skills

secret-leak-check

Use this skill to detect potential secret and privacy leaks in changed files, staged diffs, commit messages, and git identity settings before code is shared or merged.

🇺🇸|EnglishTranslated
2
Security & Complianceaaaaqwq/agi-super-skills

security-monitor

Real-time security monitoring for Clawdbot. Detects intrusions, unusual API calls, credential usage patterns, and alerts on breaches.

🇺🇸|EnglishTranslated
2
1 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

analyzing-heap-spray-exploitation

Detect and analyze heap spray attacks in memory dumps using Volatility3 plugins to identify NOP sled patterns, shellcode landing zones, and suspicious large allocations in process virtual address space.

🇺🇸|EnglishTranslated
2
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

analyzing-docker-container-forensics

Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to identify malicious activity and evidence.

🇺🇸|EnglishTranslated
2
1 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

analyzing-linux-audit-logs-for-intrusion

Parse and analyze Linux auditd logs to detect intrusion indicators including unauthorized file access, privilege escalation, syscall anomalies, and suspicious process execution using ausearch and Python.

🇺🇸|EnglishTranslated
2
1 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

testing-oauth2-implementation-flaws

Tests OAuth 2.0 and OpenID Connect implementations for security flaws including authorization code interception, redirect URI manipulation, CSRF in OAuth flows, token leakage, scope escalation, and PKCE bypass. The tester evaluates the authorization server, client application, and token handling for common misconfigurations that enable account takeover or unauthorized access. Activates for requests involving OAuth security testing, OIDC vulnerability assessment, OAuth2 redirect bypass, or authorization code flow testing.

🇺🇸|EnglishTranslated
2
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

triaging-vulnerabilities-with-ssvc-framework

Triage and prioritize vulnerabilities using CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) decision tree framework to produce actionable remediation priorities.

🇺🇸|EnglishTranslated
2
2 scripts/Checked
Security & Compliancewcly/skills

skill-security-checker

Check for security risks in Skills/code repositories. When the user wants to check if a skill, GitHub repository, npm package, or local code is safe to download or use. This includes detecting malicious code, malware, key stealing, environment variable modification, suspicious network behavior, and evaluating repository reputation (stars, forks, contributors, age). Use this skill whenever the user mentions checking skills for security risks, scanning repositories for malware, verifying code safety, checking npm packages for threats, or asking if a download is safe.

🇨🇳|ChineseTranslated
2
12 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

exploiting-oauth-misconfiguration

Identifying and exploiting OAuth 2.0 and OpenID Connect misconfigurations including redirect URI manipulation, token leakage, and authorization code theft during security assessments.

🇺🇸|EnglishTranslated
2
1 scripts/Checked
1...125126127128129...137
Page