Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,488 skills, Security & Compliance has 1085 skills

Categories

Showing 12 of 1085 skills

Per page
Downloads
Sort
Security & Compliancetrailofbits/skills

variant-analysis

Find similar vulnerabilities and bugs across codebases using pattern-based analysis. Use when hunting bug variants, building CodeQL/Semgrep queries, analyzing security vulnerabilities, or performing systematic code audits after finding an initial issue.

🇺🇸|EnglishTranslated
4
Security & Compliancetrailofbits/skills

sarif-parsing

Parse, analyze, and process SARIF (Static Analysis Results Interchange Format) files. Use when reading security scan results, aggregating findings from multiple tools, deduplicating alerts, extracting specific vulnerabilities, or integrating SARIF data into CI/CD pipelines.

🇺🇸|EnglishTranslated
4
1 scripts/Checked
Security & Compliancetrailofbits/skills

spec-to-code-compliance

Verifies code implements exactly what documentation specifies for blockchain audits. Use when comparing code against whitepapers, finding gaps between specs and implementation, or performing compliance checks for protocol implementations.

🇺🇸|EnglishTranslated
4
Security & Compliancepersonamanagmentlayer/pcl

healthcare-expert

Expert-level healthcare systems, medical informatics, HIPAA compliance, and health data standards

🇺🇸|EnglishTranslated
4
Security & Compliancenickcrew/claude-ctx-plugi...

owasp-top-10

OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.

🇺🇸|EnglishTranslated
4
Security & Compliancegetsentry/skills

security-review

Security code review for vulnerabilities. Use when asked to "security review", "find vulnerabilities", "check for security issues", "audit security", "OWASP review", or review code for injection, XSS, authentication, authorization, cryptography issues. Provides systematic review with confidence-based reporting.

🇺🇸|EnglishTranslated
4
Security & Compliancegohypergiant/agent-skills

accelint-security-best-practices

Comprehensive security audit and vulnerability detection for JavaScript/TypeScript applications following OWASP Top 10. Use when (1) Users say 'audit security', 'check for vulnerabilities', 'security review', 'implement authentication', 'secure this code', (2) Adding authentication, API endpoints, file uploads, or handling user input, (3) Working with secrets, credentials, or sensitive data, (4) Implementing payment features or blockchain integrations, (5) Conducting pre-deployment security checks. Audits for: hardcoded secrets, injection vulnerabilities, XSS/CSRF, broken access control, insecure authentication, rate limiting, dependency vulnerabilities, sensitive data exposure.

🇺🇸|EnglishTranslated
4
Security & Compliancewshobson/agents

auth-implementation-patterns

Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.

🇺🇸|EnglishTranslated
4
Security & Compliancechipagosfinest/enterprise...

legal-catchall

Legal: legal counsel, compliance, contracts, paralegal support. Triggers: contract review, legal advice, compliance, GDPR, SOC2, NDA, terms of service, privacy policy, IP, trademark, litigation, regulatory, vendor agreement.

🇺🇸|EnglishTranslated
3
Security & Complianceaj-geddes/useful-ai-promp...

incident-response-plan

Create and execute incident response procedures for security breaches, data leaks, and cyber attacks. Use when handling security incidents, creating response playbooks, or conducting forensic analysis.

🇺🇸|EnglishTranslated
3
Security & Compliancetrailofbits/skills

yara-rule-authoring

Guides authoring of high-quality YARA-X detection rules for malware identification. Use when writing, reviewing, or optimizing YARA rules. Covers naming conventions, string selection, performance optimization, migration from legacy YARA, and false positive reduction. Triggers on: YARA, YARA-X, malware detection, threat hunting, IOC, signature, crx module, dex module.

🇺🇸|EnglishTranslated
3
2 scripts/Checked
Security & Complianceaj-geddes/useful-ai-promp...

data-encryption

Implement strong encryption using AES, RSA, TLS, and proper key management. Use when securing data at rest, in transit, or implementing end-to-end encryption.

🇺🇸|EnglishTranslated
3
1...45678...91
Page