Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,575 skills, Security & Compliance has 1631 skills

Categories

Showing 12 of 1631 skills

Per page
Downloads
Sort
Security & Compliancegarden-co/jazz

jazz-permissions-security

Use this skill when designing data schemas, implementing sharing workflows, or auditing access control in Jazz applications. It covers the hierarchy of Groups, Accounts, and CoValues, ensuring data is private by default and shared securely through cascading permissions and invitations.

🇺🇸|EnglishTranslated
6
Security & Compliancevasilyu1983/ai-agents-pub...

software-security-appsec

Modern application security patterns aligned with OWASP Top 10:2025 (final), OWASP API Security Top 10 (2023), NIST SSDF, zero trust (incl. NSA ZIGs 2026), supply chain security (SBOM), passkeys/WebAuthn, authentication, authorization, input validation, cryptography, plus security ROI, breach cost modeling, and compliance-driven enterprise sales.

🇺🇸|EnglishTranslated
6
Security & Complianceth3w1zard1/reverse-engine...

binary-triage

Performs initial binary triage by surveying memory layout, strings, imports/exports, and functions to quickly understand what a binary does and identify suspicious behavior. Use when first examining a binary, when user asks to triage/survey/analyze a program, or wants an overview before deeper reverse engineering.

🇺🇸|EnglishTranslated
6
Security & Compliancedralgorhythm/claude-agent...

defense-in-depth

Apply layered security architecture. Use when designing security controls, hardening systems, or reviewing security posture. Covers multiple security layers.

🇺🇸|EnglishTranslated
6
Security & Compliancejorgealves/agent_skills

secret-leak-detector

Scans source code, configuration files, and git history for hardcoded credentials, API keys, and tokens. Use when auditing repositories for security leaks or ensuring sensitive data is not committed to version control.

🇺🇸|EnglishTranslated
6
Security & Complianceflux-point-studios/cardan...

aiken-dex-security-audit

Adversarial security audit playbook for Plutus V3 Aiken DEX contracts (threat model, invariants, findings, tests, tx repro shapes).

🇺🇸|EnglishTranslated
6
Security & Complianceigorwarzocha/opencode-wor...

security-fastapi

Review FastAPI security audit patterns for dependencies and middleware. Use for auditing auth dependencies, CORS configuration, and TrustedHost middleware. Use proactively when reviewing FastAPI apps. Examples: - user: "Audit FastAPI route security" → check for Depends() and Security() usage - user: "Check FastAPI CORS setup" → verify origins when allow_credentials=True - user: "Review FastAPI middleware" → check TrustedHost and HTTPSRedirect config - user: "Secure FastAPI API keys" → move from query params to header schemes - user: "Scan for FastAPI footguns" → check starlette integration and dependency order

🇺🇸|EnglishTranslated
6
1 scripts/Attention
Security & Compliancemicrock/ordinary-claude-s...

security-audit-example

Example security audit skill demonstrating how to audit code for security vulnerabilities. Use when the user asks to perform security reviews, check for vulnerabilities, or audit code security.

🇺🇸|EnglishTranslated
6
Security & Complianceoutfitter-dev/agents

security

This skill should be used when auditing code for security issues, reviewing authentication/authorization, evaluating input validation, analyzing cryptographic usage, or reviewing dependency security. Provides OWASP patterns, CWE analysis, and threat modeling guidance.

🇺🇸|EnglishTranslated
6
Security & Compliancedkyazzentwatwa/chatgpt-sk...

hash-calculator

Calculate cryptographic hashes (MD5, SHA1, SHA256, SHA512) for text and files. Compare hashes, verify integrity, and batch process directories.

🇺🇸|EnglishTranslated
6
1 scripts/Checked
Security & Compliancecodyswanngt/lisa

security-zap-scan

Run an OWASP ZAP baseline security scan locally using Docker. Checks for the ZAP baseline script, executes the scan, and summarizes findings by risk level with remediation recommendations.

🇺🇸|EnglishTranslated
6
Security & Complianceprompt-security/clawsec

clawsec-feed

Security advisory feed with automated NVD CVE polling for OpenClaw-related vulnerabilities. Updated daily.

🇺🇸|EnglishTranslated
6
1...3738394041...136
Page