Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,671 skills, Security & Compliance has 1088 skills

Categories

Showing 12 of 1088 skills

Per page
Downloads
Sort
Security & Compliancedauquangthanh/hanoi-rainb...

keycloak-administration

Provides comprehensive KeyCloak administration guidance including realm management, user/group administration, client configuration, authentication flows, identity brokering, authorization policies, security hardening, and troubleshooting. Covers SSO configuration, SAML/OIDC setup, role-based access control (RBAC), user federation (LDAP/AD), social login integration, multi-factor authentication (MFA), and high availability deployments. Use when configuring KeyCloak, setting up SSO, managing realms and clients, troubleshooting authentication issues, implementing RBAC, or when users mention "KeyCloak", "SSO", "OIDC", "SAML", "identity provider", "IAM", "authentication flow", "user federation", "realm configuration", or "access management".

🇺🇸|EnglishTranslated
2
Security & Compliances-hiraoku/synapse-a2a

security-audit

General-purpose security auditing guide. Covers OWASP Top 10, dependency vulnerabilities, authentication, authorization, input validation, and secret management. Use this when performing a security review or audit.

🇺🇸|EnglishTranslated
2
Security & Compliancemitsuhiko/agent-stuff

ghidra

Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.

🇺🇸|EnglishTranslated
2
2 scripts/Attention
Security & Compliancesgcarstrends/sgcarstrends

security

Security auditing for code vulnerabilities (OWASP Top 10, XSS, SQL injection) and dependency scanning (pnpm audit, Snyk). Use when handling user input, adding authentication, before deployments, or resolving CVEs.

🇺🇸|EnglishTranslated
2
Security & Complianceolehsvyrydov/ai-developme...

legal-counsel

Senior Legal Counsel with 20+ years experience in corporate law. Use for legal advice, contract drafting, compliance checks, data protection (GDPR/CCPA), employment law, or risk assessment. Auto-triggers penalty warnings and statute citations. Adapts to user's jurisdiction.

🇺🇸|EnglishTranslated
2
Security & Complianceproffesor-for-testing/age...

compliance-testing

Regulatory compliance testing for GDPR, CCPA, HIPAA, SOC2, PCI-DSS and industry-specific regulations. Use when ensuring legal compliance, preparing for audits, or handling sensitive data.

🇺🇸|EnglishTranslated
2
Security & Complianceborghei/claude-skills

senior-security

Expert security engineering covering application security, infrastructure security, threat modeling, penetration testing, and compliance.

🇺🇸|EnglishTranslated
2
Security & Compliancershankras/claude-code-app...

security

Security review and guidance for iOS, macOS, and watchOS apps. Covers secure storage, biometric authentication, network security, and platform-specific patterns. Use when implementing security features or reviewing code for vulnerabilities.

🇺🇸|EnglishTranslated
2
Security & Compliancegetsentry/skills

skill-scanner

Scan agent skills for security issues. Use when asked to "scan a skill", "audit a skill", "review skill security", "check skill for injection", "validate SKILL.md", or assess whether an agent skill is safe to install. Checks for prompt injection, malicious scripts, excessive permissions, secret exposure, and supply chain risks.

🇺🇸|EnglishTranslated
2
1 scripts/Attention
Security & Complianceovachiever/droid-tings

senior-security

Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing. Includes security assessment tools, threat modeling, crypto implementation, and security automation. Use when designing security architecture, conducting penetration tests, implementing cryptography, or performing security audits.

🇺🇸|EnglishTranslated
2
3 scripts/Checked
Security & Compliancesickn33/antigravity-aweso...

fix-review

Verify fix commits address audit findings without new bugs

🇺🇸|EnglishTranslated
2
Security & Compliancesickn33/antigravity-aweso...

security-scanning-security-dependencies

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities, assess risks, and recommend remediation.

🇺🇸|EnglishTranslated
2
1...1617181920...91
Page