Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,892 skills, Security & Compliance has 1637 skills

Categories

Showing 12 of 1637 skills

Per page
Downloads
Sort
Security & Compliancefatih-developer/fth-skill...

ecosystem-security

Three-layer security ecosystem for Agent Platforms covering pre-deployment skill auditing, real-time message protection (adaptive-guard), and continuous adaptive defense. Coordinates security-auditor and adaptive-guard. Trigger on 'security ecosystem', 'agent security', 'skill protection', or 'runtime defense'.

🇺🇸|EnglishTranslated
4
Security & Compliancefatih-developer/fth-skill...

security-orchestrator

Orchestrates the Security Ecosystem by running security-auditor and adaptive-guard in the correct order. Manages audit phases, trust scoring, guard activation, incident response, and calibration. Trigger on 'security orchestrator', 'run security', 'audit and guard', or 'security workflow'.

🇺🇸|EnglishTranslated
4
Security & Compliancevivy-yi/xiaohongshu-skill...

account-security

Use when protecting Xiaohongshu account from unauthorized access, preventing account theft, recovering compromised accounts, or implementing security measures to safeguard account and follower base

🇺🇸|EnglishTranslated
4
Security & Compliancesteipete/clawdis

openclaw-ghsa-maintainer

Maintainer workflow for OpenClaw GitHub Security Advisories (GHSA). Use when Codex needs to inspect, patch, validate, or publish a repo advisory, verify private-fork state, prepare advisory Markdown or JSON payloads safely, handle GHSA API-specific publish constraints, or confirm advisory publish success.

🇺🇸|EnglishTranslated
4
Security & Compliancemembranedev/application-s...

privacy-dynamics

Privacy Dynamics integration. Manage data, records, and automate workflows. Use when the user wants to interact with Privacy Dynamics data.

🇺🇸|EnglishTranslated
4
Security & Compliancemukul975/anthropic-cybers...

exploiting-sql-injection-vulnerabilities

Identifies and exploits SQL injection vulnerabilities in web applications during authorized penetration tests using manual techniques and automated tools like sqlmap. The tester detects injection points through error-based, union-based, blind boolean, and time-based blind techniques across all major database engines (MySQL, PostgreSQL, MSSQL, Oracle) to demonstrate data extraction, authentication bypass, and potential remote code execution. Activates for requests involving SQL injection testing, SQLi exploitation, database security assessment, or injection vulnerability verification.

🇺🇸|EnglishTranslated
4
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

exploiting-sql-injection-with-sqlmap

Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized penetration tests.

🇺🇸|EnglishTranslated
4
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

conducting-cloud-penetration-testing

This skill outlines methodologies for performing authorized penetration testing against AWS, Azure, and GCP cloud environments. It covers understanding the shared responsibility model for testing scope, leveraging cloud-specific attack tools like Pacu and ScoutSuite, exploiting IAM misconfigurations, testing for SSRF to cloud metadata services, and reporting findings aligned to MITRE ATT&CK Cloud matrix.

🇺🇸|EnglishTranslated
4
1 scripts/Checked
Security & Compliancemembranedev/application-s...

lastpass-enterprise-api

LastPass Enterprise API integration. Manage data, records, and automate workflows. Use when the user wants to interact with LastPass Enterprise API data.

🇺🇸|EnglishTranslated
4
Security & Compliancemukul975/anthropic-cybers...

detecting-privilege-escalation-attempts

Detect privilege escalation attempts including token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse across Windows and Linux.

🇺🇸|EnglishTranslated
4
2 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

detecting-attacks-on-scada-systems

This skill covers detecting cyber attacks targeting Supervisory Control and Data Acquisition (SCADA) systems including man-in-the-middle attacks on industrial protocols, unauthorized command injection into PLCs, HMI compromise, historian data manipulation, and denial-of-service against control system communications. It leverages OT-specific intrusion detection systems, industrial protocol anomaly detection, and process data analytics to identify attacks that traditional IT security tools miss.

🇺🇸|EnglishTranslated
4
1 scripts/Checked
Security & Compliancemukul975/anthropic-cybers...

detecting-cloud-threats-with-guardduty

This skill teaches security teams how to deploy and operationalize Amazon GuardDuty for continuous threat detection across AWS accounts and workloads. It covers enabling protection plans for S3, EKS, EC2 runtime monitoring, and Lambda, interpreting finding severity levels, and building automated response workflows using EventBridge and Lambda.

🇺🇸|EnglishTranslated
4
1 scripts/Checked
1...6768697071...137
Page