Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,574 skills, Security & Compliance has 1631 skills

Categories

Showing 12 of 1631 skills

Per page
Downloads
Sort
Security & Compliancecuriositech/some_claude_s...

security-auditor

Security vulnerability scanner and OWASP compliance auditor for codebases. Dependency scanning (npm audit, pip-audit), secret detection (high-entropy strings, API keys), SAST for injection/XSS vulnerabilities, and security posture reports. Activate on 'security audit', 'vulnerability scan', 'OWASP', 'secret detection', 'dependency check', 'CVE', 'security review', 'penetration testing prep'. NOT for runtime WAF configuration (use infrastructure tools), network security/firewalls, or compliance certifications like SOC2/HIPAA (legal/organizational).

🇺🇸|EnglishTranslated
1
3 scripts/Attention
Security & Compliancealsk1992/cloddsbot

credentials

Secure credential management for trading platforms

🇺🇸|EnglishTranslated
1
1 scripts/Attention
Security & Compliancealfredang/skills

secrets

Enforce secure secrets management across all platforms. Never hardcode OAuth2 secrets, API keys, tokens, passwords, or credentials in source code. Store all secrets in .env files, load from environment variables, and ensure .env is gitignored. Use this skill when: (1) writing any code that uses API keys, OAuth2 client secrets, tokens, or credentials, (2) setting up authentication or third-party integrations, (3) creating new projects that need environment configuration, (4) reviewing code for security issues related to secrets, (5) configuring CI/CD pipelines or Docker deployments with secrets. Triggers: API key, OAuth, client secret, token, credentials, .env, environment variables, secret, password, authentication setup, third-party integration.

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Complianceakaszubski/autonomous-dev

security-patterns

Security best practices, API key management, input validation. Use when handling secrets, user input, or security-sensitive code.

🇺🇸|EnglishTranslated
1
Security & Complianceelie222/inbox-zero

security

Security guidelines for API route development

🇺🇸|EnglishTranslated
1
Security & Compliancealsk1992/cloddsbot

veil

Privacy and shielded transactions on Base via Veil Cash - ZK-based anonymous transfers

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Compliancevinnie357/claude-skills

security

Secret detection and credential scanning using gitleaks. Use when scanning repositories for leaked secrets, API keys, passwords, tokens, or implementing pre-commit security checks.

🇺🇸|EnglishTranslated
1
3 scripts/Attention
Security & Compliancevladm3105/aidoc-flow-fram...

security-audit

Security analysis, vulnerability assessment, and security code reviews

🇺🇸|EnglishTranslated
1
Security & Compliancebagelhole/devops-security...

threat-modeling

Conduct threat modeling using STRIDE methodology. Identify threats, assess risks, and design security controls. Use when designing secure systems or assessing application security.

🇺🇸|EnglishTranslated
1
Security & Compliancentaksh42/agents

dependency-analyzer

Analyze project dependencies for vulnerabilities, updates, and optimization opportunities. Use when auditing dependencies or managing package versions.

🇺🇸|EnglishTranslated
1
Security & Compliancentaksh42/agents

security-audit

Perform security audits detecting OWASP Top 10 vulnerabilities, insecure dependencies, and security misconfigurations. Use when auditing applications for security vulnerabilities.

🇺🇸|EnglishTranslated
1
Security & Complianceoimiragieo/agent-studio

differential-review

Perform security-focused review of code diffs and pull requests, identifying newly introduced vulnerabilities, security regressions, and unsafe patterns in changed code.

🇺🇸|EnglishTranslated
1
3 scripts/Checked
1...132133134135136
Page