143 results (7.8ms) page 3 / 8
aj-geddes / useful-ai-prompts-security-audit-logging exact

Implement comprehensive security audit logging for compliance, forensics, and SIEM integration. Use when building audit trails, compliance logging, or security monitoring systems.

aj-geddes / useful-ai-prompts-security-documentation exact

Create security policies, guidelines, compliance documentation, and security best practices. Use when documenting security policies, compliance requirements, or security guidelines.

aj-geddes / useful-ai-prompts-zero-trust-architecture exact

Implement Zero Trust security model with identity verification, microsegmentation, least privilege access, and continuous monitoring. Use when building secure cloud-native applications.

aj-geddes / useful-ai-prompts-secrets-rotation exact

Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing secrets lifecycle, compliance requirements, or security hardening.

aj-geddes / useful-ai-prompts-data-encryption exact

Implement strong encryption using AES, RSA, TLS, and proper key management. Use when securing data at rest, in transit, or implementing end-to-end encryption.

vuralserhat86 / antigravity-agentic-skills-compliance-analyst exact

Sertifikasyon, uyumluluk gereksinimleri ve regulatory pathway araştırma rehberi.

0xbeedao / agentic-tools-dependency-auditor exact

Check dependencies for known vulnerabilities using npm audit, pip-audit, etc. Use when package.json or requirements.txt changes, or before deployments. Alerts on vulnerable dependencies. Triggers...

ovachiever / droid-tings-dependency-auditor exact

Check dependencies for known vulnerabilities using npm audit, pip-audit, etc. Use when package.json or requirements.txt changes, or before deployments. Alerts on vulnerable dependencies. Triggers...

RLGeeX / rlg-copilot-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

wshobson / agents-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

halay08 / fullstack-agent-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

rmyndharis / antigravity-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

404kidwiz / agent-skills-backup-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

DauQuangThanh / hanoi-rainbow-code-security-review exact

Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE), authentication/authorization flaws, injection attacks, cryptography issues, sensitive data...