Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,773 skills, Security & Compliance has 1634 skills

Categories

Showing 12 of 1634 skills

Per page
Downloads
Sort
Security & Compliancemembranedev/application-s...

ubiq-security

Ubiq Security integration. Manage data, records, and automate workflows. Use when the user wants to interact with Ubiq Security data.

🇺🇸|EnglishTranslated
5
Security & Compliancemembranedev/application-s...

osano

Osano integration. Manage data, records, and automate workflows. Use when the user wants to interact with Osano data.

🇺🇸|EnglishTranslated
5
Security & Compliancemembranedev/application-s...

securitytrails

SecurityTrails integration. Manage data, records, and automate workflows. Use when the user wants to interact with SecurityTrails data.

🇺🇸|EnglishTranslated
5
Security & Compliancexiaojiongqian/skills-hub

patent-search-cn-us

Patent prior-art search and novelty check guidance focused on China and the United States (CNIPA, USPTO, Google Patents, WIPO). Use when asked to plan or run CN/US patent searches, draft search strategies, or produce a preliminary novelty search report.

🇺🇸|EnglishTranslated
5
Security & Compliancealiyun/alibabacloud-aiops...

alibabacloud-waf-quick-showcase

Solution skill for using WAF to protect web applications on ECS. Used for quickly deploying network environments including VPC, security groups, and ECS instances, and integrating WAF for web application protection. Trigger words: "WAF protection", "ECS web protection", "Web Application Firewall", "website security"

🇺🇸|EnglishTranslated
5
Security & Compliancealiyun/alibabacloud-aiops...

alibabacloud-dsc-audit

Query and handle security risk events from Alibaba Cloud Data Security Center. Supports viewing the list of unprocessed risk events and performing manual handling operations on risk events. Trigger words: "Data Security Center", "security risk events", "DSC", "risk handling", "DescribeRiskRules", "PreHandleAuditRisk"

🇺🇸|EnglishTranslated
5
2 scripts/Attention
Security & Compliancejsonwebtoken/jwt-skills

jwt-validate

Verify and validate JSON Web Tokens (JWTs) by checking signatures, expiration, claims, and structure. Use when the user wants to verify, validate, or check a JWT — e.g. "verify this token", "is this JWT valid", "check the signature", "validate this token against my JWKS", "is this token expired". Supports HMAC, RSA, and ECDSA with secrets, PEM keys, or JWKS endpoints.

🇺🇸|EnglishTranslated
5
Security & Compliancemembranedev/application-s...

cloudmersive

Cloudmersive integration. Manage data, records, and automate workflows. Use when the user wants to interact with Cloudmersive data.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

deserialization-insecure

Insecure deserialization playbook. Use when Java, PHP, or Python applications deserialize untrusted data via ObjectInputStream, unserialize, pickle, or similar mechanisms that may lead to RCE, file access, or privilege escalation.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

business-logic-vulnerabilities

Business logic vulnerability playbook. Use when reasoning about workflows, race conditions, price manipulation, coupon abuse, state machines, and multi-step authorization gaps.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

api-sec

Entry P1 category router for API security. Use when choosing between API recon, authorization, token abuse, and hidden-parameter workflows before any deeper API topic skill.

🇺🇸|EnglishTranslated
5
Security & Complianceyaklang/hack-skills

clickjacking

Clickjacking playbook. Use when testing whether target pages can be framed, whether X-Frame-Options or CSP frame-ancestors are properly configured, and whether UI redress attacks can trigger sensitive actions.

🇺🇸|EnglishTranslated
5
1...5354555657...137
Page