Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,744 skills, Security & Compliance has 1089 skills

Categories

Showing 12 of 1089 skills

Per page
Downloads
Sort
Security & Compliancepatricio0312rev/skills

auth-security-reviewer

Reviews authentication and authorization implementation for session management, CSRF, cookie security, and auth flow vulnerabilities with findings, severity assessment, and fix recommendations. Use for "auth review", "session security", "CSRF protection", or "authentication audit".

🇺🇸|EnglishTranslated
2
Security & Compliancesecondsky/claude-skills

access-control-rbac

Role-based access control (RBAC) with permissions and policies. Use for admin dashboards, enterprise access, multi-tenant apps, fine-grained authorization, or encountering permission hierarchies, role inheritance, policy conflicts.

🇺🇸|EnglishTranslated
2
Security & Compliancesecondsky/claude-skills

security-headers-configuration

Configures HTTP security headers to protect against XSS, clickjacking, and MIME sniffing attacks. Use when hardening web applications, passing security audits, or implementing Content Security Policy.

🇺🇸|EnglishTranslated
2
Security & Compliancesendaifun/skills

vulnhunter

Security vulnerability detection and variant analysis skill. Use when hunting for dangerous APIs, footgun patterns, error-prone configurations, and vulnerability variants across codebases. Combines sharp edges detection with variant hunting methodology.

🇺🇸|EnglishTranslated
2
Security & Compliancepatricio0312rev/skills

multi-tenant-safety-checker

Ensures tenant isolation at query and policy level using Row Level Security, automated testing, and security audits. Prevents data leakage between tenants. Use for "multi-tenancy", "tenant isolation", "RLS", or "data security".

🇺🇸|EnglishTranslated
2
Security & Compliancemindrally/skills

python-cybersecurity-tool-development

Guidelines for building Python cybersecurity tools with secure coding practices, async scanning, and structured security testing.

🇺🇸|EnglishTranslated
2
Security & Compliancemastepanoski/claude-skill...

owasp-llm-top10

Security audit for LLM and GenAI applications using OWASP Top 10 for LLM Apps 2025. Assess prompt injection, data leakage, supply chain, and 7 more critical vulnerabilities.

🇺🇸|EnglishTranslated
2
Security & Compliancemindrally/skills

auth0-authentication

Guidelines for implementing Auth0 authentication with best practices for security, rules, actions, and SDK integration

🇺🇸|EnglishTranslated
2
Security & Compliancegmh5225/awesome-game-secu...

game-hacking-techniques

Guide for game hacking techniques and cheat development. Use this skill when researching memory manipulation, code injection, ESP/aimbot development, overlay rendering, or game exploitation methodologies.

🇺🇸|EnglishTranslated
2
Security & Compliancesickn33/antigravity-aweso...

threat-modeling-expert

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture reviews, threat identification, and secure-by-design planning.

🇺🇸|EnglishTranslated
2
Security & Compliancesickn33/antigravity-aweso...

dependency-management-deps-audit

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing issues, outdated packages, and provide actionable remediation strategies.

🇺🇸|EnglishTranslated
2
Security & Compliancesickn33/antigravity-aweso...

security-scanning-security-dependencies

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities, assess risks, and recommend remediation.

🇺🇸|EnglishTranslated
2
1...3738394041...91
Page