[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f-J9u_m62mc9Iq1FGW1Dz9luy7vf4olDGmfVeOp3WkUE":3},{"data":4},{"_id":5,"slug":6,"name":7,"description":8,"author":9,"skills":15,"isOfficial":19,"installCount":20,"favoriteCount":21,"version":22,"isActive":23,"createdAt":24,"updatedAt":25,"__v":20,"skillDetails":26,"changelog":59,"avgSecurityScore":37,"avgQualityScore":77},"69de80955c10ecfa62188b2b","compliance-scanners","Compliance scanners","GDPR - SOC2 - PDPL - EU AI act - ISO 27001",{"_id":10,"name":11,"picture":12,"connectedAccounts":13},"6999798281981b054a1c09aa","GIRUNA LABS","https:\u002F\u002Flh3.googleusercontent.com\u002Fa\u002FACg8ocKuVzuIhi3m8FQ6HcdwpqK771YxzSbACeqW0nEGTQ_wa96jT9Q=s96-c",{"github":14},null,[16,17,18],"dicklesworthstone\u002Fscanning-for-gdpr-compliance","neversight\u002Fsecurity-auditor","neversight\u002Farchitecting-security",false,0,1,"1.2.0",true,"2026-04-14T17:59:49.496Z","2026-04-24T12:12:03.887Z",[27,41,51],{"_id":28,"avatarUrl":29,"description":30,"installCount":20,"lastAnalyzedAt":31,"name":32,"owner":33,"platforms":34,"ratingCount":20,"score":20,"securityIssues":36,"securityScore":37,"slug":16,"qualityReview":38},"69999f619aa9beba177caa29","https:\u002F\u002Favatars.githubusercontent.com\u002Fu\u002F35050222?v=4","Scan for GDPR compliance issues in data handling and privacy practices. Use when ensuring EU data protection compliance. Trigger with 'scan GDPR compliance', 'check data privacy', or 'validate GDPR'.","2026-02-21T12:04:49.976Z","scanning-for-gdpr-compliance","Dicklesworthstone",[35],"openclaw",[],100,{"score":39,"pattern":40},92,"tool-wrapper",{"_id":42,"avatarUrl":43,"description":44,"installCount":20,"lastAnalyzedAt":45,"name":46,"owner":47,"platforms":48,"ratingCount":20,"score":20,"securityIssues":49,"securityScore":37,"slug":17,"qualityReview":50},"698db6a5973671540f234830","https:\u002F\u002Favatars.githubusercontent.com\u002Fu\u002F199295973?v=4","Expert in compliance frameworks (SOC2, ISO 27001), automated auditing, and risk management.","2026-02-12T11:16:53.272Z","security-auditor","NeverSight",[],[],{"score":39,"pattern":40},{"_id":52,"avatarUrl":43,"description":53,"installCount":20,"lastAnalyzedAt":54,"name":55,"owner":47,"platforms":56,"ratingCount":20,"score":20,"securityIssues":57,"securityScore":37,"slug":18,"qualityReview":58},"698dc007973671540f234e96","Design comprehensive security architectures using defense-in-depth, zero trust principles, threat modeling (STRIDE, PASTA), and control frameworks (NIST CSF, CIS Controls, ISO 27001). Use when designing security for new systems, auditing existing architectures, or establishing security governance...","2026-02-19T14:11:15.857Z","architecting-security",[],[],{"score":37,"pattern":40},[60,65,71],{"_id":61,"skillsetId":5,"version":22,"skills":62,"changelog":63,"createdAt":64,"updatedAt":64,"__v":20},"69de812f5c10ecfa62188d0b",[16,17,18],"Added architecting-security","2026-04-14T18:02:23.168Z",{"_id":66,"skillsetId":5,"version":67,"skills":68,"changelog":69,"createdAt":70,"updatedAt":70,"__v":20},"69de810a5c10ecfa62188cc9","1.1.0",[16,17],"Added security-auditor","2026-04-14T18:01:46.931Z",{"_id":72,"skillsetId":5,"version":73,"skills":74,"changelog":75,"createdAt":76,"updatedAt":76,"__v":20},"69de80955c10ecfa62188b2d","1.0.0",[16],"Initial release","2026-04-14T17:59:49.538Z",95]