Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,574 skills, Security & Compliance has 1631 skills

Categories

Showing 12 of 1631 skills

Per page
Downloads
Sort
Security & Complianceyariv1025/skills

owasp-api-security-top-10

OWASP API Security Top 10 - prevention, detection, and remediation for REST/GraphQL/API security. Use when designing or reviewing APIs - object- and function-level authorization, authentication, rate limiting and resource consumption, sensitive business flows, SSRF, API inventory and versioning, or consumption of third-party APIs.

🇺🇸|EnglishTranslated
1
Security & Compliancewhackur/solidity-agent-to...

solidity-security-best-practices

Smart contract security best practices for Solidity development. Use when writing, reviewing, or auditing Solidity code. Covers reentrancy prevention, access control patterns, safe external calls, input validation, upgrade safety, and OWASP Smart Contract Top 10 vulnerabilities. Triggers on tasks involving security, vulnerability detection, access control, CEI pattern, ReentrancyGuard, SafeERC20, or smart contract auditing.

🇺🇸|EnglishTranslated
1
Security & Complianceomer-metin/skills-for-ant...

prompt-injection-defense

Defense techniques against prompt injection attacks including direct injection, indirect injection, and jailbreaks - theUse when "prompt injection, jailbreak prevention, input sanitization, llm security, injection attack, security, prompt-injection, llm, owasp, jailbreak, ai-safety" mentioned.

🇺🇸|EnglishTranslated
1
Security & Compliancewhackur/solidity-agent-to...

solidity-adversarial-analysis

Adversarial scenario analysis and threat modeling for Solidity smart contracts. Use when analyzing contracts from an attacker's perspective, identifying multi-step attack vectors, or performing threat modeling. Covers flash loan attacks, oracle manipulation, MEV/front-running, governance exploits, reentrancy scenarios, access control bypasses, economic logic exploits, and cross-contract composability risks. Triggers on tasks involving adversarial analysis, threat modeling, attack scenarios, attack vectors, exploit analysis, or red team review.

🇺🇸|EnglishTranslated
1
Security & Compliancejackspace/claudeskillz

cloudflare-turnstile

This skill provides comprehensive knowledge for implementing Cloudflare Turnstile, the CAPTCHA-alternative bot protection system. It should be used when integrating bot protection into forms, login pages, signup flows, or any user-facing feature requiring spam/bot prevention. Turnstile runs invisible challenges in the background, maintaining excellent user experience while blocking automated traffic. Use when: Adding bot protection to forms, implementing login security, protecting API endpoints from abuse, migrating from reCAPTCHA/hCaptcha, encountering CSP errors with Turnstile, handling token validation failures, implementing E2E tests with Turnstile, integrating with React/Next.js/Hono applications, or debugging error codes 100*, 300*, 600*. Keywords: turnstile, captcha, bot protection, cloudflare challenge, siteverify, recaptcha alternative, spam prevention, form protection, cf-turnstile, turnstile widget, token validation, managed challenge, invisible challenge, @marsidev/react-turnstile, hono turnstile, workers turnstile

🇺🇸|EnglishTranslated
1
Security & Complianceplurigrid/asi

address-sanitizer

Use AddressSanitizer to detect memory safety bugs in C/C++ programs. Identifies use-after-free, buffer overflow, memory leaks, and other memory errors.

🇺🇸|EnglishTranslated
1
Security & Compliancecontextware/skills

mcp-security-scanner

Scan for unprotected MCP servers using @contextware/mcp-scan package. Enables security auditing of local AI tools and network endpoints.

🇺🇸|EnglishTranslated
1
Security & Compliancecongdon1207/agents.md

security-review

Use when reviewing code for security vulnerabilities, implementing authorization, or ensuring data protection.

🇺🇸|EnglishTranslated
1
Security & Complianceandy160675/sovereign-skil...

person-intelligence-osint

Conduct a full-spectrum public intelligence (OSINT) investigation on any individual given their name, job title, and company. Produces a structured intelligence dossier. Use when asked to research a person, build a profile, investigate a contact, create a dossier, or gather publicly available intelligence on an individual.

🇺🇸|EnglishTranslated
1
Security & Compliancestarwreckntx/irp__methodo...

enforce-security-vigilance

Enforce continuous security vigilance and threat monitoring.

🇺🇸|EnglishTranslated
1
Security & Compliancebagelhole/devops-security...

vulnerability-scanning

Scan systems and dependencies for CVEs and security vulnerabilities. Use tools like Nessus, OpenVAS, and Qualys to identify and prioritize vulnerabilities. Use when performing security assessments, compliance scanning, or vulnerability management.

🇺🇸|EnglishTranslated
1
2 scripts/Attention
Security & Complianceautumnsgrove/groveengine

secrets-management

Manages API keys, credentials, and sensitive configuration using secrets.json patterns with environment variable fallbacks. Use when working with API keys, credentials, .env files, or any sensitive configuration.

🇺🇸|EnglishTranslated
1
1...130131132133134...136
Page