Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,459 skills, Security & Compliance has 1627 skills

Categories

Showing 12 of 1627 skills

Per page
Downloads
Sort
Security & Compliancepatricio0312rev/skills

secure-headers-csp-builder

Implements security headers and Content Security Policy with safe rollout strategy (report-only → enforce), testing, and compatibility checks. Use for "security headers", "CSP", "HTTP headers", or "XSS protection".

🇺🇸|EnglishTranslated
8
Security & Complianceanthropics/knowledge-work...

contract-review

Review contracts against your organization's negotiation playbook, flagging deviations and generating redline suggestions. Use when reviewing vendor contracts, customer agreements, or any commercial agreement where you need clause-by-clause analysis against standard positions.

🇺🇸|EnglishTranslated
8
Security & Compliancemindrally/skills

python-cybersecurity-tool-development

Guidelines for building Python cybersecurity tools with secure coding practices, async scanning, and structured security testing.

🇺🇸|EnglishTranslated
8
Security & Compliancebankrbot/openclaw-skills

veil

Privacy and shielded transactions on Base via Veil Cash (veil.cash). Deposit ETH into a private pool, withdraw/transfer privately using ZK proofs. Manage Veil keypairs, check private/queue balances, and submit deposits via Bankr. Use when the user wants anonymous or private transactions, shielded transfers, or ZK-based privacy on Base.

🇺🇸|EnglishTranslated
8
14 scripts/Attention
Security & Compliancemapbox/mapbox-agent-skill...

mapbox-token-security

Security best practices for Mapbox access tokens, including scope management, URL restrictions, rotation strategies, and protecting sensitive data. Use when creating, managing, or advising on Mapbox token security.

🇺🇸|EnglishTranslated
8
Security & Compliancedauquangthanh/hanoi-rainb...

keycloak-administration

Provides comprehensive KeyCloak administration guidance including realm management, user/group administration, client configuration, authentication flows, identity brokering, authorization policies, security hardening, and troubleshooting. Covers SSO configuration, SAML/OIDC setup, role-based access control (RBAC), user federation (LDAP/AD), social login integration, multi-factor authentication (MFA), and high availability deployments. Use when configuring KeyCloak, setting up SSO, managing realms and clients, troubleshooting authentication issues, implementing RBAC, or when users mention "KeyCloak", "SSO", "OIDC", "SAML", "identity provider", "IAM", "authentication flow", "user federation", "realm configuration", or "access management".

🇺🇸|EnglishTranslated
8
Security & Compliancepersonamanagmentlayer/pcl

standards-expert

Expert-level ISO standards, quality management, compliance, and certification

🇺🇸|EnglishTranslated
8
Security & Compliancesteipete/clawdis

healthcheck

Host security hardening and risk-tolerance configuration for OpenClaw deployments. Use when a user asks for security audits, firewall/SSH/update hardening, risk posture, exposure review, OpenClaw cron scheduling for periodic checks, or version status checks on a machine running OpenClaw (laptop, workstation, Pi, VPS).

🇺🇸|EnglishTranslated
8
Security & Compliancelevnikolaevich/claude-cod...

ln-761-secret-scanner

Scans codebase for hardcoded secrets. Returns normalized findings with severity and remediation guidance. Pre-commit hook integration.

🇺🇸|EnglishTranslated
8
Security & Compliancegetsentry/skills

django-access-review

Django access control and IDOR security review. Use when reviewing Django views, DRF viewsets, ORM queries, or any Python/Django code handling user authorization. Trigger keywords: "IDOR", "access control", "authorization", "Django permissions", "object permissions", "tenant isolation", "broken access".

🇺🇸|EnglishTranslated
8
Security & Compliancesanctifiedops/solana-skil...

rug-detection-checklist

Comprehensive rug detection for Solana tokens - red flags, contract analysis, LP verification, insider patterns, and escape routes. Use before buying any token to protect against scams.

🇺🇸|EnglishTranslated
8
Security & Compliancenickcrew/claude-ctx-plugi...

owasp-top-10

OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.

🇺🇸|EnglishTranslated
8
1...1213141516...136
Page