Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 44,010 skills, Security & Compliance has 1638 skills

Categories

Showing 12 of 1638 skills

Per page
Downloads
Sort
Security & Compliancehimself65/auth-spec

security-best-practice

Audit and harden authentication code for security best practices. Use when the user wants to check their auth implementation for vulnerabilities, harden session handling, fix credential storage, or apply OWASP-recommended security patterns.

🇺🇸|EnglishTranslated
3
Security & Compliancejd-opensource/joysafeter

pentest-osint-recon

Open Source Intelligence gathering and attack surface management for external reconnaissance.

🇺🇸|EnglishTranslated
3
Security & Compliancereason-healthcare/health-...

health-hipaa-review

Produce a report-only HIPAA, PHI, and PII audit for healthcare codebases and delivery systems. Inspects code, configs, data flows, integrations, logging, and deployment boundaries for privacy and security gaps without modifying code.

🇺🇸|EnglishTranslated
3
Security & Complianceparandurume-labs/conducto...

careful

Safety guardrails that warn before destructive commands. Use to protect beginners from accidentally running dangerous operations like rm -rf, DROP TABLE, git push --force, or git reset --hard. Provides beginner-friendly explanations of WHY a command is dangerous and suggests safer alternatives. Activate when the user mentions safety, careful mode, guardrails, protection, or when working with beginners on tasks involving file deletion, database changes, or git operations.

🇺🇸|EnglishTranslated
3
Security & Compliancesteipete/clawdis

security-triage

Triage GitHub security advisories for OpenClaw with high-confidence close/keep decisions, exact tag and commit verification, trust-model checks, optional hardening notes, and a final reply ready to post and copy to clipboard.

🇺🇸|EnglishTranslated
3
Security & Compliancegithub/awesome-copilot

gdpr-compliant

Apply GDPR-compliant engineering practices across your codebase. Use this skill whenever you are designing APIs, writing data models, building authentication flows, implementing logging, handling user data, writing retention/deletion jobs, designing cloud infrastructure, or reviewing pull requests for privacy compliance. Trigger this skill for any task involving personal data, user accounts, cookies, analytics, emails, audit logs, encryption, pseudonymization, anonymization, data exports, breach response, CI/CD pipelines that process real data, or any question framed as "is this GDPR-compliant?". Inspired by CNIL developer guidance and GDPR Articles 5, 25, 32, 33, 35.

🇺🇸|EnglishTranslated
3
Security & Compliancealo-exp/silver-bullet

security

Use when designing, planning, implementing, or reviewing any non-trivial change — enforces defense in depth, input validation, secure defaults, and OWASP best practices to prevent vulnerabilities before they ship

🇺🇸|EnglishTranslated
3
Security & Compliancetrailofbits/skills

trailmark

Builds and queries multi-language source code graphs for security analysis. Includes pre-analysis passes for blast radius, taint propagation, privilege boundaries, and entry point enumeration. Use when analyzing call paths, mapping attack surface, finding complexity hotspots, enumerating entry points, tracing taint propagation, measuring blast radius, or building a code graph for audit prioritization. Supports 16 languages including Solidity, Cairo, Circom, Rust, Go, Python, C/C++, TypeScript.

🇺🇸|EnglishTranslated
3
Security & Compliancetrailofbits/skills

graph-evolution

Compares Trailmark code graphs at two source code snapshots (git commits, tags, or directories) to surface security-relevant structural changes. Detects new attack paths, complexity shifts, blast radius growth, taint propagation changes, and privilege boundary modifications that text diffs miss. Use when comparing code between commits or tags, analyzing structural evolution, detecting attack surface growth, reviewing what changed between audit snapshots, or finding security-relevant changes that text diffs miss.

🇺🇸|EnglishTranslated
3
1 scripts/Checked
Security & Compliancecinience/alicloud-skills

aliyun-kms-manage

Use when managing Alibaba Cloud Key Management Service (KMS) via OpenAPI/SDK, including the user needs key lifecycle/resource operations, policy/configuration changes, status inspection, or troubleshooting KMS API workflows.

🇺🇸|EnglishTranslated
3
1 scripts/Checked
Security & Compliance0xshe/php-code-audit-skil...

php-crlf-audit

PHP Web source code CRLF/response splitting audit tool. Identifies user input that enters HTTP response headers, analyzes filtering and encoding of newlines/control characters, and outputs severity ratings, PoCs and fix suggestions (omission is prohibited).

🇨🇳|ChineseTranslated
3
Security & Compliancemembranedev/application-s...

chef-inspec

Chef InSpec integration. Manage data, records, and automate workflows. Use when the user wants to interact with Chef InSpec data.

🇺🇸|EnglishTranslated
3
1...8283848586...137
Page