Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,773 skills, Security & Compliance has 1635 skills

Categories

Showing 12 of 1635 skills

Per page
Downloads
Sort
Security & Compliancegithub/awesome-copilot

agent-supply-chain

Verify supply chain integrity for AI agent plugins, tools, and dependencies. Use this skill when: - Generating SHA-256 integrity manifests for agent plugins or tool packages - Verifying that installed plugins match their published manifests - Detecting tampered, modified, or untracked files in agent tool directories - Auditing dependency pinning and version policies for agent components - Building provenance chains for agent plugin promotion (dev → staging → production) - Any request like "verify plugin integrity", "generate manifest", "check supply chain", or "sign this plugin"

🇺🇸|EnglishTranslated
5
Security & Compliancep4nda0s/reverse-skills

rev-frida

Generate Frida hook scripts using modern Frida API. Activate when the user wants to write Frida scripts, hook functions at runtime, trace calls/arguments/return values, intercept native or ObjC/Java methods, or dump memory and exports.

🇺🇸|EnglishTranslated
5
Security & Compliancep4nda0s/reverse-skills

rev-idapython

IDAPython and IDALib script reference for reverse engineering. Activate when the user needs to write IDAPython scripts in IDA, use IDALib for headless analysis, operate on IDB databases, debug with IDA, manipulate memory/registers, traverse functions/blocks/instructions, work with Hex-Rays decompiler API, handle obfuscation, or batch-process binaries.

🇺🇸|EnglishTranslated
5
Security & Compliancetransilienceai/communityt...

reconnaissance

Domain assessment and web application mapping - subdomain discovery, port scanning, endpoint enumeration, API discovery, and attack surface analysis.

🇺🇸|EnglishTranslated
5
Security & Compliancemembranedev/application-s...

scaled-access

Scaled Access integration. Manage data, records, and automate workflows. Use when the user wants to interact with Scaled Access data.

🇺🇸|EnglishTranslated
5
Security & Compliancemembranedev/application-s...

burp-suite

Burp Suite integration. Manage data, records, and automate workflows. Use when the user wants to interact with Burp Suite data.

🇺🇸|EnglishTranslated
5
Security & Compliancemembranedev/application-s...

contrast-security

Contrast Security integration. Manage data, records, and automate workflows. Use when the user wants to interact with Contrast Security data.

🇺🇸|EnglishTranslated
5
Security & Complianceasgard-ai-platform/skills

tw-healthcare-regulations

Navigate Taiwan healthcare regulations including NHI system, medical device classification, drug registration, telemedicine rules, and health data protection. Use this skill when the user is building a health tech product for Taiwan, needs to understand NHI, evaluate medical device regulatory pathways, or assess telemedicine compliance — even if they say 'sell a medical device in Taiwan', 'how does NHI work', 'telemedicine regulations', or 'health data privacy in Taiwan'.

🇺🇸|EnglishTranslated
5
Security & Complianceasgard-ai-platform/skills

law-labor

Analyze Taiwan labor law fundamentals under the Labor Standards Act including working hours, overtime, leave, and termination rules. Use this skill when the user needs to understand employment obligations, calculate overtime pay, evaluate whether a termination is lawful, or design compliant HR policies — even if they say 'how much overtime pay do I owe', 'can I fire this employee', 'what leave are employees entitled to', or 'are we complying with labor law'.

🇺🇸|EnglishTranslated
5
Security & Complianceasgard-ai-platform/skills

law-ip

Analyze intellectual property rights across patents, trademarks, copyrights, and trade secrets. Use this skill when the user needs to understand IP protection options, evaluate whether their work is protectable, assess infringement risk, or design an IP strategy — even if they say 'can I patent this', 'someone copied our design', 'how do we protect our brand name', or 'what IP do we have'.

🇺🇸|EnglishTranslated
5
Security & Complianceasgard-ai-platform/skills

law-contract

Analyze contract fundamentals including formation requirements (offer, acceptance, consideration), essential clauses, and common risk areas. Use this skill when the user needs to review a contract, understand contract terms, identify risky clauses, or draft contract provisions — even if they say 'review this agreement', 'what should I watch out for in this contract', or 'is this clause standard'.

🇺🇸|EnglishTranslated
5
Security & Complianceworkersio/spec

audit-context-building

Deep codebase analysis for building architectural context before vulnerability or bug finding. Uses line-by-line analysis with First Principles, 5 Whys, and 5 Hows. Use when deep comprehension is needed before security auditing, architecture review, or threat modeling.

🇺🇸|EnglishTranslated
5
1...5556575859...137
Page