Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,299 skills, Security & Compliance has 1627 skills

Categories

Showing 12 of 1627 skills

Per page
Downloads
Sort
Security & Complianceaffaan-m/everything-claud...

healthcare-phi-compliance

Protected Health Information (PHI) and Personally Identifiable Information (PII) compliance patterns for healthcare applications. Covers data classification, access control, audit trails, encryption, and common leak vectors.

🇺🇸|EnglishTranslated
11
Security & Compliancetrailofbits/skills

agentic-actions-auditor

Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations including Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference. Detects attack vectors where attacker-controlled input reaches AI agents running in CI/CD pipelines, including env var intermediary patterns, direct expression injection, dangerous sandbox configurations, and wildcard user allowlists. Use when reviewing workflow files that invoke AI coding agents, auditing CI/CD pipeline security for prompt injection risks, or evaluating agentic action configurations.

🇺🇸|EnglishTranslated
11
Security & Compliancedaymade/claude-code-skill...

repomix-safe-mixer

Safely package codebases with repomix by automatically detecting and removing hardcoded credentials before packing. Use when packaging code for distribution, creating reference packages, or when the user mentions security concerns about sharing code with repomix.

🇺🇸|EnglishTranslated
10
2 scripts/Checked
Security & Complianceanthropics/knowledge-work...

legal-risk-assessment

Assess and classify legal risks using a severity-by-likelihood framework with escalation criteria. Use when evaluating contract risk, assessing deal exposure, classifying issues by severity, or determining whether a matter needs senior counsel or outside legal review.

🇺🇸|EnglishTranslated
10
Security & Compliancebobmatnyc/claude-mpm-skil...

threat-modeling

Threat modeling workflow for software systems: scope, data flow diagrams, STRIDE analysis, risk scoring, and turning mitigations into backlog and tests

🇺🇸|EnglishTranslated
10
Security & Compliancetenequm/claude-plugins

solana-security

Audit Solana programs (Anchor or native Rust) for security vulnerabilities. Use when reviewing smart contract security, finding exploits, analyzing attack vectors, performing security assessments, or when explicitly asked to audit, review security, check for bugs, or find vulnerabilities in Solana programs.

🇺🇸|EnglishTranslated
10
Security & Complianceomer-metin/skills-for-ant...

security-owasp

Expert at securing web applications against OWASP Top 10 vulnerabilities. Covers authentication, authorization, input validation, XSS prevention, CSRF protection, secure headers, and security testing. Treats security as a first-class requirement, not an afterthought. Use when "security, OWASP, XSS, CSRF, SQL injection, authentication security, authorization, input validation, secure headers, vulnerability, penetration testing, security, owasp, authentication, authorization, xss, csrf, injection, headers" mentioned.

🇺🇸|EnglishTranslated
10
Security & Complianceyoanbernabeu/supabase-pen...

supabase-audit-rpc

List and test exposed PostgreSQL RPC functions for security issues and potential RLS bypass.

🇺🇸|EnglishTranslated
10
Security & Complianceaj-geddes/useful-ai-promp...

zero-trust-architecture

Implement Zero Trust security model with identity verification, microsegmentation, least privilege access, and continuous monitoring. Use when building secure cloud-native applications.

🇺🇸|EnglishTranslated
10
Security & Complianceaj-geddes/useful-ai-promp...

security-audit-logging

Implement comprehensive security audit logging for compliance, forensics, and SIEM integration. Use when building audit trails, compliance logging, or security monitoring systems.

🇺🇸|EnglishTranslated
10
Security & Complianceduck4nh/antigravity-kit

pentest-expert

Penetration testing methodology expert. OWASP, PTES, reconnaissance, scanning, exploitation, reporting. Use for security assessments.

🇺🇸|EnglishTranslated
10
Security & Complianceuseai-pro/openclaw-skills...

setup-auditor

Audit your OpenClaw environment for credential leaks, unsafe defaults, and missing sandbox configuration. Wizard-style: answers questions about your setup and produces a fix checklist.

🇺🇸|EnglishTranslated
10
1...7891011...136
Page