Browse Skills
Implementing Gcp Organization Policy Constraints
v1.0.0Implement GCP Organization Policy constraints to enforce security guardrails across the entire resource hierarchy, restricting risky configurations and ensuring compliance at organization, folder, and project levels.
Implementing Gcp Binary Authorization
v1.0.0Implement GCP Binary Authorization to enforce deploy-time security controls that ensure only trusted, attested container images are deployed to Google Kubernetes Engine and Cloud Run.
Implementing Fuzz Testing In Cicd With Aflplusplus
v1.0.0Integrate AFL++ coverage-guided fuzz testing into CI/CD pipelines to discover memory corruption, input handling, and logic vulnerabilities in C/C++ and compiled applications.
Implementing File Integrity Monitoring With Aide
v1.0.0Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation, scheduled integrity checks, change detection, and alerting
Implementing Epss Score For Vulnerability Prioritization
v1.0.0Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based on real-world exploitation probability within 30 days.
Implementing Envelope Encryption With Aws Kms
v1.0.0Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself is encrypted with a master key (KEK) managed by AWS KMS. This approach allows encrypting
Implementing Endpoint Dlp Controls
v1.0.0>
Implementing Endpoint Detection With Wazuh
v1.0.0Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule XML creation, alert querying via the Wazuh REST API, and automated response actions.
Implementing End To End Encryption For Messaging
v1.0.0End-to-end encryption (E2EE) ensures that only the communicating parties can read messages, with no intermediary (including the server) able to decrypt them. This skill implements a simplified version
Implementing Email Security With Dmarc Dkim Spf
v1.0.0>-
Implementing Email Sandboxing With Proofpoint
v1.0.0Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware and evasive phishing payloads. Proofpoint Targeted Attack Protection (TAP) is an industry
Implementing Dragos Platform For Ot Monitoring
v1.0.0>