Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,378 skills, Security & Compliance has 1084 skills

Categories

Showing 12 of 1084 skills

Per page
Downloads
Sort
Security & Complianceljagiello/ctf-skills

ctf-reverse

Reverse engineering techniques for CTF challenges. Use when analyzing binaries, game clients, obfuscated code, or esoteric languages.

🇺🇸|EnglishTranslated
79
Security & Complianceljagiello/ctf-skills

ctf-web

Web exploitation techniques for CTF challenges. Use when solving web security challenges involving XSS, SQLi, CSRF, file upload bypasses, JWT attacks, Web3/blockchain exploits, or other web vulnerabilities.

🇺🇸|EnglishTranslated
76
Security & Compliancek-dense-ai/claude-scienti...

iso-13485-certification

Comprehensive toolkit for preparing ISO 13485 certification documentation for medical device Quality Management Systems. Use when users need help with ISO 13485 QMS documentation, including (1) conducting gap analysis of existing documentation, (2) creating Quality Manuals, (3) developing required procedures and work instructions, (4) preparing Medical Device Files, (5) understanding ISO 13485 requirements, or (6) identifying missing documentation for medical device certification. Also use when users mention medical device regulations, QMS certification, FDA QMSR, EU MDR, or need help with quality system documentation.

🇺🇸|EnglishTranslated
74
1 scripts/Checked
Security & Compliancezackkorman/skills

audit

Used to run an audit via our auditing service.

🇺🇸|EnglishTranslated
42
Security & Complianceyoanbernabeu/supabase-pen...

supabase-audit-buckets-list

List all storage buckets and their configuration to identify the storage attack surface.

🇺🇸|EnglishTranslated
41
Security & Complianceyoanbernabeu/supabase-pen...

supabase-evidence

Initialize and manage the evidence collection directory for professional security audits with documented proof of findings.

🇺🇸|EnglishTranslated
37
Security & Compliancebobmatnyc/claude-mpm-skil...

threat-modeling

Threat modeling workflow for software systems: scope, data flow diagrams, STRIDE analysis, risk scoring, and turning mitigations into backlog and tests

🇺🇸|EnglishTranslated
26
Security & Complianceworkersio/spec

solana-audit

Structured Solana smart contract security audit using parallel scanning agents with confidence-scored findings. Use when the user asks to audit, review, or analyze a Solana program for security vulnerabilities, or when code contains solana_program, anchor_lang, pinocchio,

🇺🇸|EnglishTranslated
16
Security & Complianceigorwarzocha/opencode-wor...

security-ai-keys

Review AI API key leakage patterns and redaction strategies. Use for identifying exposed keys for OpenAI, Anthropic, Gemini, and 10+ other providers. Use proactively when code integrates AI providers or when environment variables/keys are present. Examples: - user: "Check for leaked OpenAI keys" → scan for `sk-` patterns and client-side exposure - user: "Is my Gemini integration secure?" → audit vertex AI config and key redaction - user: "Review AI provider logging" → ensure secrets are redacted from logs - user: "Scan for Anthropic secrets" → check for `ant-` keys in code and configs - user: "Audit Vertex AI integration" → verify proper IAM roles and service account usage

🇺🇸|EnglishTranslated
10
1 scripts/Attention
Security & Compliancewshobson/agents

anti-reversing-techniques

Understand anti-reversing, obfuscation, and protection techniques encountered during software analysis. Use when analyzing protected binaries, bypassing anti-debugging for authorized analysis, or understanding software protection mechanisms.

🇺🇸|EnglishTranslated
10
Security & Compliancebinance/binance-skills-hu...

query-token-audit

Query token security audit to detect scams, honeypots, and malicious contracts before trading. Returns comprehensive security analysis including contract risks, trading risks, and scam detection. Use when users ask "is this token safe?", "check token security", "audit token", or before any swap.

🇺🇸|EnglishTranslated
7
Security & Compliancearadotso/trending-skills

shannon-ai-pentester

Autonomous white-box AI pentester for web applications and APIs using source code analysis and live exploit execution

🇺🇸|EnglishTranslated
5
12345...91
Page