Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,685 skills, Security & Compliance has 1632 skills

Categories

Showing 12 of 1632 skills

Per page
Downloads
Sort
Security & Complianceelastic/agent-skills

elasticsearch-audit

Enable, configure, and query Elasticsearch security audit logs. Use when the task involves audit logging setup, event filtering, or investigating security incidents like failed logins.

🇺🇸|EnglishTranslated
5
Security & Complianceelastic/agent-skills

elasticsearch-authn

Authenticate to Elasticsearch using native, file-based, LDAP/AD, SAML, OIDC, Kerberos, JWT, or certificate realms. Use when connecting with credentials, choosing a realm, or managing API keys. Assumes the target realms are already configured.

🇺🇸|EnglishTranslated
5
Security & Complianceduraninci/openclaw-legal-...

legal-risk-assessment-anthropic

Assess and classify legal risks using a severity-by-likelihood framework with escalation criteria. Use when evaluating contract risk, assessing deal exposure, classifying issues by severity, or determining whether a matter needs senior counsel or outside legal review.

🇺🇸|EnglishTranslated
5
Security & Complianceelastic/agent-skills

security-generate-security-sample-data

Generate sample security events, attack scenarios, and synthetic alerts for Elastic Security. Use when demoing, populating dashboards, testing detection rules, or setting up a POC.

🇺🇸|EnglishTranslated
5
4 scripts/Attention
Security & Complianceelastic/agent-skills

security-detection-rule-management

Create, tune, and manage Elastic Security detection rules (SIEM and Endpoint). Use for false positives, exceptions, new coverage, noisy rules, or rule management via Kibana API.

🇺🇸|EnglishTranslated
5
6 scripts/Attention
Security & Complianceelastic/agent-skills

security-case-management

Create, search, update, and manage SOC cases via the Kibana Cases API. Use when tracking incidents, linking alerts to cases, adding investigation notes, or managing triage output.

🇺🇸|EnglishTranslated
5
2 scripts/Attention
Security & Complianceelastic/agent-skills

security-alert-triage

Triage Elastic Security alerts — gather context, classify threats, create cases, and acknowledge. Use when triaging alerts, performing SOC analysis, or investigating detections.

🇺🇸|EnglishTranslated
5
5 scripts/Attention
Security & Compliancemukul975/anthropic-cybers...

conducting-full-scope-red-team-engagement

Plan and execute a comprehensive red team engagement covering reconnaissance through post-exploitation using MITRE ATT&CK-aligned TTPs to evaluate an organization's detection and response capabilities.

🇺🇸|EnglishTranslated
5
2 scripts/Checked
Security & Complianceborghei/claude-skills

soc2-compliance-expert

SOC 2 Type I and Type II compliance management. Use when conducting SOC 2 readiness assessments, performing gap analysis against Trust Services Criteria, collecting audit evidence, validating infrastructure security controls, preparing for CPA firm audits, managing the observation period, or building continuous compliance programs. Covers all TSC categories (CC1-CC9, A1, PI1, C1, P1) with infrastructure validation for cloud, DNS, TLS, endpoints, and CI/CD pipelines.

🇺🇸|EnglishTranslated
5
3 scripts/Checked
Security & Compliancemicrosoftdocs/agent-skill...

azure-defender-for-iot

Expert knowledge for Azure Defender For Iot development including troubleshooting, best practices, decision making, architecture & design patterns, limits & quotas, security, configuration, integrations & coding patterns, and deployment. Use when deploying OT sensors, configuring micro agents, setting up traffic mirroring, or integrating with Sentinel/SIEM, and other Azure Defender For Iot related development tasks. Not for Azure Defender For Cloud (use azure-defender-for-cloud), Azure Security (use azure-security), Azure External Attack Surface Management (use azure-external-attack-surface-management), Azure Sentinel (use azure-sentinel).

🇺🇸|EnglishTranslated
5
Security & Compliancewshobson/agents

attack-tree-construction

Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.

🇺🇸|EnglishTranslated
5
Security & Compliancewshobson/agents

binary-analysis-patterns

Master binary analysis patterns including disassembly, decompilation, control flow analysis, and code pattern recognition. Use when analyzing executables, understanding compiled code, or performing static analysis on binaries.

🇺🇸|EnglishTranslated
5
1...4243444546...136
Page