tag

security

117 indexed skills · max 10 per page

skills (117)

better-auth-security-best-practices

better-auth/skills · Productivity

0

better-auth-security-best-practices

security-requirement-extraction

wshobson/agents · Frontend

0

Transform threat analysis into actionable security requirements. \n \n Converts STRIDE threat categories into functional, non-functional, and constraint requirements with automatic priority calculation based on impact and likelihood \n Generates security user stories, acceptance criteria, and test cases directly from threats; includes traceability matrices linking threats to requirements \n Maps requirements to compliance frameworks (PCI-DSS, HIPAA, GDPR, SOC2, NIST, ISO 27001, OWASP) and identi

alicloud-security-id-verification-cloudauth-test

cinience/alicloud-skills · Cloud

0

Category: test

alicloud-security-content-moderation-green-test

cinience/alicloud-skills · Cloud

0

Category: test

security-engineer

daffy0208/ai-dev-standards · Productivity

0

Security is not optional - build it in from day one.

network-security-groups

aj-geddes/useful-ai-prompts · Productivity

0

Implement network security groups and firewall rules to enforce least privilege access, segment networks, and protect infrastructure from unauthorized access.

security-bluebook-builder

sickn33/antigravity-awesome-skills · Frontend

0

Build a minimal but real security policy for sensitive apps. The output is a single, coherent Blue Book document using MUST/SHOULD/CAN language, with explicit assumptions, scope, and security gates.

capacitor-security

cap-go/capacitor-skills · Productivity

0

Zero-config security scanning for Capacitor and Ionic apps.

k8s-security-policies

sickn33/antigravity-awesome-skills · Cloud

0

Comprehensive guide for implementing NetworkPolicy, PodSecurityPolicy, RBAC, and Pod Security Standards in Kubernetes.

frontend-security

schalkneethling/webdev-agent-skills · Frontend

0

Perform comprehensive security audits of frontend codebases to identify vulnerabilities, bad practices, and missing protections.

prevpage 3 / 12next