Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,709 skills, Security & Compliance has 1088 skills

Categories

Showing 12 of 1088 skills

Per page
Downloads
Sort
Security & Compliancepersonamanagmentlayer/pcl

lawyer-expert

Expert-level legal systems, contracts, compliance, and legal technology

🇺🇸|EnglishTranslated
2
Security & Compliancesickn33/antigravity-aweso...

legal-advisor

Draft privacy policies, terms of service, disclaimers, and legal notices. Creates GDPR-compliant texts, cookie policies, and data processing agreements. Use PROACTIVELY for legal documentation, compliance texts, or regulatory requirements.

🇺🇸|EnglishTranslated
2
Security & Complianceexistential-birds/beagle

elixir-security-review

Reviews Elixir code for security vulnerabilities including code injection, atom exhaustion, and secret handling. Use when reviewing code handling user input, external data, or sensitive configuration.

🇺🇸|EnglishTranslated
2
Security & Compliancegeeksfino/finskills

suitability-report-generator

Generate institutional-grade investment suitability reports including rationale, risk disclosure, and client suitability assessment. Use when the user asks to document investment decisions, create compliance reports, generate risk disclosures, prepare client-facing investment justifications, write suitability assessments, or produce fiduciary documentation for an investment recommendation or portfolio.

🇺🇸|EnglishTranslated
2
Security & Compliancevasilyu1983/ai-agents-pub...

software-security-appsec

Modern application security patterns aligned with OWASP Top 10:2025 (final), OWASP API Security Top 10 (2023), NIST SSDF, zero trust (incl. NSA ZIGs 2026), supply chain security (SBOM), passkeys/WebAuthn, authentication, authorization, input validation, cryptography, plus security ROI, breach cost modeling, and compliance-driven enterprise sales.

🇺🇸|EnglishTranslated
2
Security & Complianceauth0/agent-skills

auth0-mfa

Use when adding multi-factor authentication (MFA/2FA) or requiring additional verification for sensitive operations - covers step-up auth, adaptive MFA, and risk-based authentication with Auth0

🇺🇸|EnglishTranslated
2
Security & Compliancenesnilnehc/ai-cortex

review-security

Review code for security: injection, sensitive data, authentication and authorization, dependencies and CVEs, configuration and secrets, and crypto. Cognitive-only atomic skill; output is a findings list.

🇺🇸|EnglishTranslated
2
Security & Compliancemindrally/skills

security-best-practices

Security best practices for backend development, microservices, and secure coding patterns with emphasis on input validation and authentication

🇺🇸|EnglishTranslated
2
Security & Compliancewrsmith108/varlock-claude...

varlock

Secure environment variable management with Varlock. Use when handling secrets, API keys, credentials, or any sensitive configuration. Ensures secrets are never exposed in terminals, logs, traces, or Claude's context. Trigger phrases include "environment variables", "secrets", ".env", "API key", "credentials", "sensitive", "Varlock".

🇺🇸|EnglishTranslated
2
Security & Complianceshantoislamdev/skills

deep-audit

Universal security and robustness scanner for any codebase. Use when auditing code for vulnerabilities, security issues, bugs, or robustness problems. Automatically detects tech stack, creates custom audit plans, and performs recursive deep analysis.

🇺🇸|EnglishTranslated
2
Security & Compliancemadsnorgaard/agent-resour...

drupal-security

Drupal security expertise. Auto-activates when writing forms, controllers, queries, or handling user input. Prevents XSS, SQL injection, and access bypass vulnerabilities.

🇺🇸|EnglishTranslated
2
Security & Complianceramzxy/ctf

ctf-malware

Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic.

🇺🇸|EnglishTranslated
2
1...2324252627...91
Page