Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 30,649 skills, Security & Compliance has 1087 skills

Categories

Showing 12 of 1087 skills

Per page
Downloads
Sort
Security & Compliancecontextware/skills

mcp-security-scanner

Scan for unprotected MCP servers using @contextware/mcp-scan package. Enables security auditing of local AI tools and network endpoints.

🇺🇸|EnglishTranslated
1
Security & Compliancecongdon1207/agents.md

security-review

Use when reviewing code for security vulnerabilities, implementing authorization, or ensuring data protection.

🇺🇸|EnglishTranslated
1
Security & Complianceandy160675/sovereign-skil...

person-intelligence-osint

Conduct a full-spectrum public intelligence (OSINT) investigation on any individual given their name, job title, and company. Produces a structured intelligence dossier. Use when asked to research a person, build a profile, investigate a contact, create a dossier, or gather publicly available intelligence on an individual.

🇺🇸|EnglishTranslated
1
Security & Compliancestarwreckntx/irp__methodo...

enforce-security-vigilance

Enforce continuous security vigilance and threat monitoring.

🇺🇸|EnglishTranslated
1
Security & Compliancebagelhole/devops-security...

vulnerability-scanning

Scan systems and dependencies for CVEs and security vulnerabilities. Use tools like Nessus, OpenVAS, and Qualys to identify and prioritize vulnerabilities. Use when performing security assessments, compliance scanning, or vulnerability management.

🇺🇸|EnglishTranslated
1
2 scripts/Attention
Security & Complianceautumnsgrove/groveengine

secrets-management

Manages API keys, credentials, and sensitive configuration using secrets.json patterns with environment variable fallbacks. Use when working with API keys, credentials, .env files, or any sensitive configuration.

🇺🇸|EnglishTranslated
1
Security & Compliancelawvable/awesome-legal-sk...

vendor-due-diligence-patrick-munro

Framework for assessing IT service providers, technology vendors, and third-party partners. Creates structured risk assessments across financial, operational, compliance, security, and reputational dimensions with regulatory checklists (GDPR, DORA, NIS2, SOX). Use when: (1) Evaluating new vendors or technology providers, (2) Conducting third-party risk assessments for procurement, (3) Performing critical vendor due diligence for regulatory compliance, (4) Creating vendor onboarding documentation, (5) Establishing ongoing vendor monitoring processes, (6) Assessing vendor concentration risk, or (7) Generating executive-level vendor risk reports.

🇺🇸|EnglishTranslated
1
Security & Compliancepluginagentmarketplace/cu...

safety-filter-bypass

Techniques to test and bypass AI safety filters, content moderation systems, and guardrails for security assessment

🇺🇸|EnglishTranslated
1
1 scripts/Checked
Security & Complianceoimiragieo/agent-studio

tauri-security-rules

Security-related rules for Tauri application development.

🇺🇸|EnglishTranslated
1
3 scripts/Checked
Security & Complianceautumnsgrove/groveengine

gathering-security

The drum sounds. Spider, Raccoon, and Turtle gather for complete security work. Use when implementing auth, auditing security, or hardening code end-to-end.

🇺🇸|EnglishTranslated
1
Security & Compliancenickcrew/claude-ctx-plugi...

kubernetes-security-policies

Kubernetes security policies, RBAC, and Pod Security Standards for hardened cluster deployments. Use when implementing cluster security, defining network policies, or enforcing security compliance in Kubernetes environments.

🇺🇸|EnglishTranslated
1
Security & Compliancesherifeldeeb/agentskills

disk-forensics

Analyze disk images and file systems for forensic investigation. Use when investigating data theft, insider threats, malware persistence, deleted file recovery, or any incident requiring analysis of storage media. Supports NTFS, FAT, EXT, HFS+, and APFS file systems.

🇺🇸|EnglishTranslated
1
1...7172737475...91
Page