5199 results (40.5ms) page 10 / 260
Ed1s0nZ / cyberstrikeai-security-automation exact

ๅฎ‰ๅ…จ่‡ชๅŠจๅŒ–็š„ไธ“ไธšๆŠ€่ƒฝๅ’Œๆ–นๆณ•่ฎบ

proffesor-for-testing / agentic-qe-qe-security-compliance exact

Security auditing, vulnerability scanning, and compliance validation for OWASP, SOC2, GDPR, and other standards.

gmh5225 / awesome-skills-security-skills-guide exact

Guide for security-related Agent Skills including penetration testing, code auditing, threat hunting, and forensics skills.

aj-geddes / useful-ai-prompts-network-security-groups exact

Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.

ngxtm / devkit-secure-code-guardian exact

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP...

Jeffallan / claude-skills-secure-code-guardian exact

Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP...

aj-geddes / useful-ai-prompts-security-headers-configuration exact

Configure HTTP security headers including CSP, HSTS, X-Frame-Options, and XSS protection. Use when hardening web applications against common attacks.

waynesutton / convexskills-convex-security-audit exact

Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations

charlietlamb / ferix-convex-security-audit exact

Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations