audit-expert
About
The `audit-expert` skill provides expert-level security auditing and compliance guidance for developers, specializing in code reviews, vulnerability assessments, and regulatory frameworks like SOC 2 and GDPR. It helps conduct security audits, analyze code for vulnerabilities, and ensure infrastructure compliance. Use this skill when you need to review code security, prepare for compliance audits, or assess your application against established security standards.
Quick Install
Claude Code
Recommendednpx skills add majiayu000/claude-skill-registry -a claude-code/plugin add https://github.com/majiayu000/claude-skill-registrygit clone https://github.com/majiayu000/claude-skill-registry.git ~/.claude/skills/audit-expertCopy and paste this command in Claude Code to install this skill
GitHub Repository
Related Skills
github-code-review
OtherThis skill enables AI-powered multi-agent code reviews for GitHub pull requests using swarm coordination. It performs comprehensive analysis including security, performance, and quality checks while automating PR management tasks. Use it when you need intelligent, automated code review beyond basic static analysis in your GitHub workflow.
sherlock-review
OtherSherlock Review performs evidence-based code investigation using deductive reasoning to verify implementation claims and find root causes. It systematically analyzes code, tests, and history to determine what actually happened versus what was reported. Use this skill for validating fixes, investigating bugs, or conducting rigorous code reviews.
test-data-management
OtherThis Claude Skill generates and manages synthetic test data while ensuring privacy compliance. It helps developers create realistic test datasets without exposing PII by using faker libraries and anonymization techniques. Use it when building test data, handling GDPR/CCPA requirements, or scaling data generation for testing scenarios.
security-checklist
MetaThis skill provides security guidance for implementing measures or conducting audits. It delivers OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines. Use it to ensure applications are protected against common vulnerabilities during development or review.
