Total 30,463 skills, Security & Compliance has 1085 skills
Showing 12 of 1085 skills
Manage IAM users, roles, and policies. Implement least-privilege access and security best practices. Use when configuring AWS identity and access management.
YC SAFE Agreement review and advisory skill for startup founders and lawyers. Use when user (1) uploads a SAFE agreement for review/comparison, (2) asks questions about how SAFEs work, or (3) requests to draft a standard YC SAFE. Triggers on keywords like SAFE, Simple Agreement for Future Equity, YC SAFE, valuation cap, discount, MFN, pro rata, convertible instrument.
Security auditing for Rust/WebAssembly applications. Identifies vulnerabilities, reviews unsafe code, validates input handling, and ensures secure defaults. Follows OWASP guidelines and Rust security best practices.
Run testssl.sh to analyze TLS/SSL configurations. Checks cipher suites, protocols, certificate validity, known vulnerabilities (Heartbleed, POODLE, ROBOT), and compliance.
Run ScoutSuite for multi-cloud security auditing. Collects configuration data from AWS, Azure, GCP, Oracle, and Alibaba Cloud and generates an interactive security report.
扫描网络端口以检查可用性和检测运行的服务。
Validates Australian Business Numbers (ABN) and retrieves entity details from the Australian Business Register (ABR) for compliance verification
使用 @aptx/api-plugin-csrf 添加 CSRF 保护。触发条件:当代码需要在请求中添加 CSRF token、配置 cookie/header 名称、处理 SSR/Node 环境的 cookie 读取、或使用 createCsrfMiddleware 时使用。
Detection and prevention of illegal tax avoidance, Part IVA anti-avoidance triggers, circular arrangements, and sham transactions. Ensures all recommendations are legally defensible and do not constitute tax fraud.
OWASP ASVS 5.0 Level 1 security audit with deterministic, evidence-based findings. Use this when asked for a security audit or asvs audit.
Comprehensive security audit of codebase using multiple security-auditor agents. Use before production deployments or after major features.
Authentication and authorization specialist covering Auth0, Clerk, and Firebase Auth. Use when implementing authentication, authorization, MFA, SSO, passkeys, WebAuthn, social login, or security features. Supports enterprise (Auth0), modern UX (Clerk), and mobile-first (Firebase) patterns.