40 results (5.6ms) page 2 / 2
YunYue1029 / agent-skills-explain exact

Explain either project code/flows or general technical concepts; for pure knowledge questions do not read project files, and never modify any files

404kidwiz / claude-supercode-skills-compliance-auditor exact

Specialized auditor for SOC2, HIPAA, GDPR, and regulatory compliance frameworks across industries

aj-geddes / useful-ai-prompts-incident-response-plan exact

Create and execute incident response procedures for security breaches, data leaks, and cyber attacks. Use when handling security incidents, creating response playbooks, or conducting forensic analysis.

aj-geddes / useful-ai-prompts-security-compliance-audit exact

Conduct comprehensive security compliance audits for SOC 2, GDPR, HIPAA, PCI-DSS, and ISO 27001. Use when preparing for certification, annual audits, or compliance validation.

DonggangChen / antigravity-agentic-skills-incident-response exact

Coordinate security incident response efforts. Includes classification, playbook generation, evidence gathering, and remediation planning. Validates response strategies against best practices.

semgrep / skills-llm-security exact

Security guidelines for LLM applications based on OWASP Top 10 for LLM 2025. Use when building LLM apps, reviewing AI security, implementing RAG systems, or asking about LLM vulnerabilities like...

vuralserhat86 / antigravity-agentic-skills-incident-response exact

Coordinate security incident response efforts. Includes classification, playbook generation, evidence gathering, and remediation planning. Validates response strategies against best practices.

halay08 / fullstack-agent-skills-mtls-configuration exact

Configure mutual TLS (mTLS) for zero-trust service-to-service communication. Use when implementing zero-trust networking, certificate management, or securing internal service communication.

rmyndharis / antigravity-skills-mtls-configuration exact

Configure mutual TLS (mTLS) for zero-trust service-to-service communication. Use when implementing zero-trust networking, certificate management, or securing internal service communication.

bitwize-music-studio / claude-ai-music-skills-researchers-security exact

Malware analysis, CVEs, attribution reports, hacker communities

aj-geddes / useful-ai-prompts-cloud-security-configuration exact

Implement comprehensive cloud security across AWS, Azure, and GCP with IAM, encryption, network security, compliance, and threat detection.

aj-geddes / useful-ai-prompts-access-control-rbac exact

Implement Role-Based Access Control (RBAC), permissions management, and authorization policies. Use when building secure access control systems with fine-grained permissions.

aj-geddes / useful-ai-prompts-security-audit-logging exact

Implement comprehensive security audit logging for compliance, forensics, and SIEM integration. Use when building audit trails, compliance logging, or security monitoring systems.

aj-geddes / useful-ai-prompts-security-documentation exact

Create security policies, guidelines, compliance documentation, and security best practices. Use when documenting security policies, compliance requirements, or security guidelines.