Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,576 skills, Security & Compliance has 1629 skills

Categories

Showing 12 of 1629 skills

Per page
Downloads
Sort
Security & Compliancedavila7/claude-code-templ...

quality-manager-qms-iso13485

ISO 13485 Quality Management System specialist for medical device companies. Provides QMS implementation, maintenance, process optimization, and compliance expertise. Use for QMS design, documentation control, management review, internal auditing, corrective actions, and ISO 13485 certification activities.

🇺🇸|EnglishTranslated
7
1 scripts/Checked
Security & Compliancelawvable/awesome-legal-sk...

politique-confidentialite-malik-taiar

Guide pour la rédaction de politiques de confidentialité conformes au RGPD. Contient les recommandations CNIL 2020, un template de référence et les bonnes pratiques. À utiliser lors de la rédaction ou révision d'une politique de confidentialité pour un site web ou une application.

🇺🇸|EnglishTranslated
7
Security & Compliancedavila7/claude-code-templ...

information-security-manager-iso27001

Senior Information Security Manager specializing in ISO 27001 and ISO 27002 implementation for HealthTech and MedTech companies. Provides ISMS implementation, cybersecurity risk assessment, security controls management, and compliance oversight. Use for ISMS design, security risk assessments, control implementation, and ISO 27001 certification activities.

🇺🇸|EnglishTranslated
7
1 scripts/Checked
Security & Compliancedavila7/claude-code-templ...

security-compliance

Guides security professionals in implementing defense-in-depth security architectures, achieving compliance with industry frameworks (SOC2, ISO27001, GDPR, HIPAA), conducting threat modeling and risk assessments, managing security operations and incident response, and embedding security throughout the SDLC.

🇺🇸|EnglishTranslated
7
2 scripts/Checked
Security & Compliancetrailofbits/skills

firebase-apk-scanner

Scans Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. Use when analyzing APK files for Firebase vulnerabilities, performing mobile app security audits, or testing Firebase endpoint security. For authorized security research only.

🇺🇸|EnglishTranslated
7
Security & Complianceed1s0nz/cyberstrikeai

file-upload-testing

文件上传漏洞测试的专业技能和方法论

🇺🇸|EnglishTranslated
7
Security & Compliancetrailofbits/skills

cairo-vulnerability-scanner

Scans Cairo/StarkNet smart contracts for 6 critical vulnerabilities including felt252 arithmetic overflow, L1-L2 messaging issues, address conversion problems, and signature replay. Use when auditing StarkNet projects.

🇺🇸|EnglishTranslated
7
Security & Complianceyoanbernabeu/supabase-pen...

supabase-audit-auth-signup

Test if user signup is open and identify potential abuse vectors in the registration process.

🇺🇸|EnglishTranslated
7
Security & Complianceyoanbernabeu/supabase-pen...

supabase-audit-authenticated

Create a test user (with explicit permission) to audit what authenticated users can access vs anonymous users. Detects IDOR, cross-user access, and privilege escalation.

🇺🇸|EnglishTranslated
7
Security & Compliancewshobson/agents

attack-tree-construction

Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.

🇺🇸|EnglishTranslated
7
Security & Compliancepatricio0312rev/skills

input-validation-sanitization-auditor

Identifies and fixes XSS, SQL injection, and command injection vulnerabilities with validation schemas, sanitization libraries, and safe coding patterns. Use for "input validation", "XSS prevention", "SQL injection", or "sanitization".

🇺🇸|EnglishTranslated
7
Security & Compliancetrailofbits/skills

constant-time-analysis

Detects timing side-channel vulnerabilities in cryptographic code. Use when implementing or reviewing crypto code, encountering division on secrets, secret-dependent branches, or constant-time programming questions in C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, or Ruby.

🇺🇸|EnglishTranslated
7
1...2021222324...136
Page