Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,644 skills, Security & Compliance has 1631 skills

Categories

Showing 12 of 1631 skills

Per page
Downloads
Sort
Security & Compliancemukul975/anthropic-cybers...

detecting-insider-threat-behaviors

Detect insider threat behavioral indicators including unusual data access, off-hours activity, mass file downloads, privilege abuse, and resignation-correlated data theft.

🇺🇸|EnglishTranslated
1
2 scripts/Checked
Security & Compliancelawvable/awesome-legal-sk...

legal-risk-assessment-zacharie-laik

Conduct legal research and risk analysis using GoodLegal MCP tools. Use this skill whenever the user asks a legal question, wants to research case law or legislation, needs a legal risk assessment, or asks about French or EU law. Trigger on any mention of jurisprudence, legal research, contract risk, regulatory analysis, legal memo, or references to GoodLegal tools — even if the user just says something like "can you look into whether this clause is enforceable" or "what does the case law say about X".

🇺🇸|EnglishTranslated
1
Security & Compliancecrazymarky/pentest-skills

exploit-xss

Cross-site scripting (XSS) vulnerability detection and exploitation. Supports reflected XSS, stored XSS, DOM-based XSS, and blind XSS testing. Use this skill when user mentions XSS, cross-site scripting, script injection, or needs to test JavaScript injection in parameters, forms, headers, or DOM sources.

🇺🇸|EnglishTranslated
1
12 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

detecting-serverless-function-injection

Detects and prevents code injection attacks targeting serverless functions (AWS Lambda, Azure Functions, Google Cloud Functions) through event source poisoning, malicious layer injection, runtime command execution, and IAM privilege escalation via function modification. The analyst combines static analysis of function code, CloudTrail event correlation, runtime behavior monitoring, and IAM policy auditing to identify injection vectors across the expanded serverless attack surface including API Gateway, S3, SQS, DynamoDB Streams, and CloudWatch event triggers. Activates for requests involving Lambda security assessment, serverless injection detection, function event poisoning analysis, or serverless privilege escalation investigation.

🇺🇸|EnglishTranslated
1
1 scripts/Attention
Security & Compliancecrazymarky/pentest-skills

pentest-report

Generate penetration testing reports in standard format, including project information sheet, vulnerability discovery list, detailed vulnerability information (including attribute sheet, description, reproduction steps, evidence screenshots, remediation suggestions), and appendices (risk level definition, CVSS explanation, glossary). Use this skill when users request to generate penetration testing reports, security testing reports, or vulnerability reports. Strictly follow the standard format in the project template directory.

🇨🇳|ChineseTranslated
1
Security & Compliancemukul975/anthropic-cybers...

scanning-kubernetes-manifests-with-kubesec

Perform security risk analysis on Kubernetes resource manifests using Kubesec to identify misconfigurations, privilege escalation risks, and deviations from security best practices.

🇺🇸|EnglishTranslated
1
2 scripts/Checked
Security & Compliancebagelhole/devops-security...

vulnerability-scanning

Scan systems and dependencies for CVEs and security vulnerabilities. Use tools like Nessus, OpenVAS, and Qualys to identify and prioritize vulnerabilities. Use when performing security assessments, compliance scanning, or vulnerability management.

🇺🇸|EnglishTranslated
1
2 scripts/Attention
Security & Complianceautumnsgrove/groveengine

secrets-management

Manages API keys, credentials, and sensitive configuration using secrets.json patterns with environment variable fallbacks. Use when working with API keys, credentials, .env files, or any sensitive configuration.

🇺🇸|EnglishTranslated
1
Security & Compliancelawvable/awesome-legal-sk...

vendor-due-diligence-patrick-munro

Framework for assessing IT service providers, technology vendors, and third-party partners. Creates structured risk assessments across financial, operational, compliance, security, and reputational dimensions with regulatory checklists (GDPR, DORA, NIS2, SOX). Use when: (1) Evaluating new vendors or technology providers, (2) Conducting third-party risk assessments for procurement, (3) Performing critical vendor due diligence for regulatory compliance, (4) Creating vendor onboarding documentation, (5) Establishing ongoing vendor monitoring processes, (6) Assessing vendor concentration risk, or (7) Generating executive-level vendor risk reports.

🇺🇸|EnglishTranslated
1
Security & Compliancepluginagentmarketplace/cu...

safety-filter-bypass

Techniques to test and bypass AI safety filters, content moderation systems, and guardrails for security assessment

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Complianceoimiragieo/agent-studio

tauri-security-rules

Security-related rules for Tauri application development.

🇺🇸|EnglishTranslated
1
3 scripts/Checked
Security & Complianceautumnsgrove/groveengine

gathering-security

The drum sounds. Spider, Raccoon, and Turtle gather for complete security work. Use when implementing auth, auditing security, or hardening code end-to-end.

🇺🇸|EnglishTranslated
1
1...129130131132133...136
Page